Matt

dollar, money, earn money-1968713.jpg

Using behavioral security to protect online financial transactions

You don’t need to be a technical wizard to better protect against cyber threats when conducting financial business online. There are technical controls and then there are behavioral controls that can be implemented to stay safe online. Here are five methods using behavioral security to improve online financial security. Use two-factor authentication (2FA) for financial …

Using behavioral security to protect online financial transactions Read More »

office, home, workspace-820390.jpg

How to disable copy/paste between a VMWare Workstation 16 Player virtual machine and its host machine

This quick tutorial demonstrates how to disable copy/paste operations between a VMWare Workstation 16 Player virtual machine (VM) and its host machine. The method outlined below involves editing a file in the virtual machine’s directory. Before proceeding with the instructions, make sure the VM is turned off. NOTES: VMWare Workstation Player 16 can be downloaded …

How to disable copy/paste between a VMWare Workstation 16 Player virtual machine and its host machine Read More »

upgrade, windows, laptop-3727076.jpg

Two quick wins that help secure a computer against malware

Two security practices go a long way in protecting a computer against security threats. 1. Use a standard account instead of an administrator account for daily use Using a standard (non-admin) account instead of an administrator account for daily use helps to slow down or stop malware. Limiting user rights also helps restrict what malware …

Two quick wins that help secure a computer against malware Read More »