Our Blog
Cybersecurity Lingo: What is an “Attack Surface” ?
Cybersecurity Lingo: What is an "attack surface"? Simply: it is anywhere an attacker can get into your systems if proper security is not applied. This [...]
UPDATE YOUR SOFTWARE ALREADY
I know I know, you hear it all the time, BUT UPDATE YOUR SOFTWARE. Today's bugs all come from Chrome, where we have MULTIPLE security [...]
Free Threat Hunting Special Limited Time Offer
Did you know that the average time a Hacker is in your network is 6 months BEFORE they strike? There are TWO recent KNOXVILLE Ransomware [...]
Why You Should Start Encrypting Your Laptop
In March, we brought on a new client whose previous IT provider did not insist on encrypting laptops. One of the users also had a [...]
Don’t Use A VPN. Do This Instead
VPNs have been all the rage for the last couple of years. The hype is that they protect your privacy, encrypt your traffic, and increase [...]
Ukraine Invasion | 3 Cybersecurity Steps To Prepare For It
The Department of Homeland Security released a warning letter on 23 January 2022 — expect Russia to come for you. So what are the 3 Cybersecurity [...]
WordPress: I’ll Download that Database, Please
A recent WordPress vulnerability allows hackers to basically download* the entire site. Here's why that matters to you: Your small business website probably runs on [...]
Alexa, Please Hack Yourself
Amazon "smart speakers" can now hack *themselves*. 🤦 Academic researchers have devised a new working exploit that commandeers Amazon Echo smart speakers and forces them [...]
Serious Linux Bug
A couple of weeks ago one of the most significant bugs ever found in Linux was announced, here is why that matters to you: 1. [...]
JM Addington Cybersecurity Risk Assessment
A Cybersecurity Risk Assessment From JM Addington Technology Solutions Is Only $497* Can You Really Afford Not To Know What Has Been Left Open? If [...]
Don’t Leave Your Network Security Door Open
Is your company as secure as you think it is? How would you know? You won’t if you don’t do this. My wife locks the [...]
We <3 Knoxville
JM Addington Gives Love to Knoxville this February! Sign up for a Cybersecurity Risk Assessment today with JM Addington Technology Solutions and get a goodie [...]
Digital Framing in the Real World
A "shadowy hacker group" has been targeting people... "for at least a decade," reports Gizmodo, "sometimes using its digital powers to plant fabricated evidence of [...]
A Cybersecurity Scam Story: I Was Scammed
My wife sent me the link late Saturday night. I was exhausted from driving non-stop through fog and rain for 13 hours and then hitting [...]
Government Policy & Technology: A Know-Nothing Proposition
One of the most significant issues technology faces today is government policy. Govt officials DO NOT understand how tech works and rarely implement rational policies [...]