Latest Articles

Garage Sale! Ubiquiti UniFi Cloud Key

Ubiquiti UniFi Cloud Key New, in box (2 units), 1 floor display unit UniFi® Controller Hybrid Cloud Secure UniFi Hybrid Cloud Technology Fully Integrated, Stand-Alone UniFi Controller Hardware Remote, Private Cloud Access to the UniFi ControllerManage Your Networks...

Garage Sale! Ubiquiti UniFi AP AC Pro Wireless Access Point

Ubiquiti UniFi AP AC Pro Wireless Access Point New, in box (2 units available) The UniFi AC Pro AP features the latest Wi-Fi 802.11ac, 3x3 MIMO technology in a refined industrial design and is ideal for deployment of maximum‑performance wireless networks. Manage Your...

Garage Sale! Ubiquiti UniFi Security Gateway Pro

Ubiquiti Unifi Security Gateway ProSN: 1801kfcecda036c89-4nqi9w New, in box. Enterprise Gateway Router with Gigabit Ethernet Advanced Security, Monitoring, and Management Sophisticated Routing Features Integrates with UniFi® Controller SoftwareManage Your Networks...

Garage Sale! Ubiquiti Unifi Switch 24 250W

Ubiquiti Unifi Switch 24 250WSN: 1752g788a20fa31ba-2n5und Floor model, unboxed. Managed PoE+ Gigabit Switches with SFP Build and expand your network with Ubiquiti Networks® UniFi® Switch, part of the UniFi line of products. The UniFi Switch is a fully managed, PoE+...

Garage Sale! Ubiquiti Unifi Switch 16 150w

Lucky you, Santa left some IT goodies under our tree! Ubiquiti UniFi Switch 16 150WSN: 788A20FD84B9New, in box.The UniFi® Switch delivers robust performance over its 18 independent switching ports. Two SFP ports offer optical connectivity, and 16 Gigabit Ethernet...

Q: Is getting on the unsecured WIFI connection at a library a really unsafe idea?

A: An insecure network is an insecure network - regardless of the physical or geographical location. As to how unsafe it may be, depends on your definition. The biggest issue is the good possibility that your network traffic is watched. This means that any username,...

Q: How to make a strong password I can remember?

A: Sorry, that is simply not possible. The current US Government recommendation for strong passwords is a minimum of 15 characters. Our brains would have a tough time remembering just five such passwords, much less a different password for every website. The easy...

Q: What precautions can be taken to avoid being traced online?

A: This is a topic that books are written about (several by yours truly). Much depends on how high a value target you are (if the NSA is interested in you, good luck), and what you need to use the internet for. But here is a list to get started: Use a quality VPN...
Cybersecurity is everyones business

Get Your Bitdefender Upgrade

MintzIT has upgraded Bitdefender With over 40 million malware waiting to harvest, corrupt, or encrypt your data, anti-malware software is an essential addition to the operating system of any and every operating system. The only anti-malware product we currently...

Q: How secure is personal information that we provide to hotels?

Unless you are staying at some shady facility, the law requires a drivers license or other ID in order to reserve a room. With your state-issued ID in hand, your information is monetized when sent to the hotel ownership (some other multinational Corp) for sales and marketing.

Q: What are the reasons my school and work track everything I do on the Internet?

A: If someone came to you asking for $1000, the keys to your car, and your credit card, you would probably want to know what they were using them for. Not so different for your school and work.

Q: How often should I change my passwords?

A: According to NIST (one of the federal groups tasked with creating best practices for cybersecurity), there is no longer any recommendation on password aging. That doesn't mean it's not a bright idea to do so, just that there are no recommendations. The...
encrypted communications

Google search found to be personalized even when logged out

The Problem As reported in the December 4, 2018 SpreadPrivacy.com article, when performing internet searches using Google, the results were personalized for the user even when logged out of the user's Google account, and when in Incognito Mode. The...
NIST Logo

Q: What is NIST 800-171, and why is it so important?

A: The NIST SP 800-171 is a best-practices form, something like a checklist on steroids. It is created and produced by NIST (National Institute of Standards and Technology), one of the two federal teams charged with helping to ensure cybersecurity. The other is...
encrypted communications

How to Secure Your Web Browsing

For most of us, almost all of our time on the computer is spent on a web browser. This time is so very valuable to advertisers, that Google paid Apple $9,000,000,000 (yes, 9 Billion dollars) a year just so that Google is the default search engine for Apple Safari. Why...

Q: Why does my IT support not want me to run updates?

A: Although I can't speak specifically as to why your IT support doesn't want you to run updates, I can give reasons why MintzIT restricts clients from doing so. Spoiler alert... It's not because we are power-mad admins trying to keep the end-user under our boot!...
macOS 10.14

New Macs prevent hackers from eavesdropping on your microphone

Apple released documentation today on their T2 chip, included with the new Macs released today, as well as the MacBook Pros released earlier this year. The T2 security chip helps to protect encryption keys, encrypted storage, fingerprint data, and secure boot...

Q: What can I do if I have someone’s Gmail account username?

A: Nothing. Fundamentally all you have is an email address. If you were interested in committing a felony, you could attempt to hack into their Google account. But assuming the user has a strong password and has enabled Two-Factor Authentication, it would be a futile...

Q: Do malware immediately affect computers when installed?

A: Some malware do nothing until a triggering effect (specific time, amount of time since install, application launched, website visited, etc.) Some take some action immediately. Well-designed malware will never present evidence of their presence to the user. This is...

Q: How can I prevent my Yahoo e-mail from being hacked?

A: There are a number of standard steps to take regardless of your email provider: Use a strong password. The current recommendation is a minimum of 15 characters, in a password that is unique and not used with any other of your websites or services. Add 2-Factor...

Latest Books

Latest Reviews

A Great Step-By-Step Guide You'd be Foolish Not to Follow

5 star reviews

reviewsThis reviewer is a 60+, female, self-trained MAC user currently in OS10.8.1 and getting ready to buy a new MAC with Mavericks OS. I purchased and read Marc’s book cover to cover in preparation for understanding the scope of my commitment to get my new Maverick OS computer set-up in the most optimal way, for my home-use network. I want to get it hardened from the get-go. This was the best forty odd-dollar investment I could have made.Security book reviews

Practical Paranoia for the non-paranoid...

5 star reviews
reviews

I became a client of Marc’s five or six years ago when I said goodbye to Windows, became a Mac shop and put in an OS X server. So when Marc announced his new book, Practical Paranoia, I didn’t waste any time buying a copy.

The reason is simple, when Marc tells you something, you can take it to the bank.

The book is clean, well organized, designed to be completely accessible for the non-geek, and provides step-by-step screen shots and instructions on how to save yourself from the nightmare of data loss or breach.Security book reviews

 

Best Book on the Subject

5 star reviews
reviews

Easy to use – I did about half of the recommendations in under an hour. I’m a writer and I run a business from home. I’m not so technically adept. When I travel, I hate packing up all my equipment and putting things in storage to make sure that, in the unlikely event the house is robbed, all my data is safe and I could easily restart my business from a backup in the cloud. This book is a “paint-by-numbers” approach to security for every aspect of a computer system, from backups to email to encrypting the physical drives.

There’s really nothing else on the subject, unless you want to read technical blogs for days. This book has it all in one place and makes it easy for even a normal person (like me).Security book reviews

This month only, get the newly released Live! versions of Practical Paranoia macOS 10.14 & Practical Paranoia iOS12
for half off!
Dismiss