Bulletproof Office Helping You to Better Enable Your IT

By: Steve | July 31, 2015


As you likely know by now, Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.  

Now there is a scam targeted at iPhone and iPad users that will appear via a pop up message as you are doing an internet search with Safari.

You will be interrupted by a message that tells you that your device has been locked because a third-party application has crashed your iOS operating system. 

When you call the toll free number provided, the scammer will ask you for your credit card information so they can charge you for removing the third party applicat...

By: Steve | March 19, 2015


 Cybercriminals are constantly developing new tactics and business models because it is so profitable! And while all systems are vulnerable, some are more at risk than others. Criminals of all types are lazy and cybercriminals also look for the "easy" way in.  Consequently, those with the weakest security are the most frequent targets. 

Fortunately, there are specific measures you can take to make your organization a less attractive target. These measures will substantially reduce your risk and improve the safeguards that protect your data, including important customer and employee data.

Upgrade Your Firewall

You’re operating a business, and the first thing you need is a firewall that provides commercial-grade protection. Too...

By: Steve | February 05, 2015

Golden Laptop

A $250,000 fine has been paid to the Department of Health and Human Services for the breach of 148 patients' data when a laptop was stolen from the vehicle of a QCA Health Plan of Arkansas employee. The laptop was not encrypted.

"Covered entities and business associates must understand that mobile device security is their obligation. Our message (with this large fine) is simple: encryption is your best defense against these incidents," said Susan McAndrew, Office for Civil Rights deputy director of health information privacy. 

Chances are, your laptop or tablet often goes where you go, carrying Practice data and patient record information from office to vehicle to home and back again. Throw in a side trip to the grocery store, ...

By: Steve | November 11, 2014

email danger

The Department of Homeland Security (DHS) is warning of an active email phishing campaign designed to install a new version of banking malware on computers, and virtually everyone is a target, including entities within the U.S. government, foreign governments, the U.S. education sector, commercial businesses, and state, local, and tribal organizations. The phishing campaign involves emails with malicious links or attachments.


By: Steve | August 26, 2014

Department of Homeland Security

My firm, JDL Technologies, is a member of the Miami Electronic Crimes Task Force of the U.S. Secret Service. We received this information late Friday (08/22/2014) and wanted to share it with you for your potential action.

The Department of Homeland Security (DHS) is encouraging organizations, regardless of size, to   proactively check for possible Point of Sale (PoS) malware infections, which have been delivered through remote desktop applications such as Microsoft Remote Desktop, Apple Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway and LogMeIn. 

Over the past year, the U. S. Secret Service has responded to network intrusions at numerous businesses throughout the U.S. who have been impacted by...

By: Steve | August 15, 2014

Good Security Habits for Mobile Devices


The good news about our smart phone society is that those convenient little devices are just so very powerful! All those awesome games and apps! And the ease of communication and collaboration, whether it be by phone, text or video!  

By: Steve | July 16, 2014

Don't forget to run Vulnerability Scans

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for security weaknesses.

There are various types of vulnerability scanners available today, distinguished from one another by a focus on particular targets. While functionality varies between different types of scanners, they share a common, core purpose of identifying and enumerating the vulnerabilities present in one or more targets.  

Network Guard Dog

Vulnerability scanners are a core technology component of vulnerability management. 

Scans should be done at least once per year and, please keep in mind, they do create a lot of information to review, so plan accordingly.  You also o...

By: Steve | June 17, 2014

Be sure to utilize a Domain Controller

Within the context of the Microsoft world, a Domain Controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain.

Protecting ePHI
Protecting ePHI

A Domain is a concept whereby a user may be granted access to a number of computer resources with the use of a single username and password combination. By implementing a DC, you create a more locked down network security environment and allow for the implementation of security rules across all of your networked devices. A great by-product of implementing a DC is that it can also serve to increase your network speed.

By: Steve | June 12, 2014

Wireless Freedom
Wireless Freedom!

Increase Security Controls for Wireless Access

The beauty of Wi-Fi is the flexibility and convenience it provides. Unfortunately, because wireless access points are so easy to deploy and get running, sufficient care is often not taken regarding proper security safeguards.

Remember, cyber-criminals, whether they are professionals or high-school hackers, like all criminals, are opportunists. So, if you just do the following three things, you will disable most threats and encourage your attackers to look for other "low hanging fruit."

Wireless Access Points

  1. Use WPA2 encryption. WEP (Wired Equivalent Privacy) is an older method of security used to secure wireless networks. WPA/WPA2-Personal (PSK) stands for Wi-Fi Protected Access with a Pre-Shared Key, and was...

By: Steve | June 04, 2014

Time to do a review of  your environment and perform a bit of "security housekeeping."

  • Reset all default passwords, including networked peripherals that are often left with a default password like "admin."
  • Remove all unnecessary applications.
  • Close all unnecessary network communication ports.
  • Delete any accounts that are no longer used. 
  • Review any other methods you may have in your environment to further secure all network-attached devices - don't forget about things like IP security cameras or other specialized equipment like diagnostic devices in healthcare.  If it is connected to your network, there is a conceivable way that a cyber-thief can hack their way in and find their way to your data.  
This well done a...