WELCOME TO
Taranet's Cyber
Security Blog
The goal of our blog is to take complex security issues, and make them simple to understand. Our blog subjects are designed to educate, offer guidance, and express our high level of expertise.
Security Patching
The first time I was told by a computer security guru that I needed to patch my computer, I thought, “Why” Is there something that will leak out?” To put it mildly, at the time I was not very computer savvy. However, in my defense, I wasn’t too far off by asking that question. A service patch is a piece of computer code that is added to an executable program to fix a bug or vulnerability. Sometimes these bugs aren’t
Banking on Banks
Like many of you, carrying actual currency is not the norm in the age of Google, Samsung, Apple pay, and the other numerous cashless and contactless payment options available to consumers. If you factor in that most credit cards offer points or some other incentive to use their card, in conjunction with the many mobile payment options, relegates carrying cash to something rarely done. So on a recent trip to the bank, someplace I rarely go, the following occurred. I
Privacy and Security in the Modern Age
Can you have both? In the aftermath of Wikileaks and Snowden, any expectation of privacy and security on company information systems has gone extinct. Most corporate networks greet users with a warning and consent banner upon login, but if users took the time to read the entire disclaimer, they would realize that they are subject to monitoring. Most people conduct personal business during the workday on the company computer. Most businesses don’t have a problem or policy against using company
The Day the Password Died
I still remember when having a computer in your business was like being in a Jetson cartoon. But by the 1980s, computing was becoming the norm, and soon there was a computer on every desk. It wasn’t long before we were all connected by the Internet. Businesses were able to expand their area of operation, and it became possible to find more supply distributors. Life was good. However, it wasn’t long until we realized that computing wasn’t restricted to good, honest