❌

Reading view

There are new articles available, click to refresh the page.

Moving away from insecure mail

ON SECURITY By Susan Bradley Tax season provides an opportunity for businesses to do better. Before I get started, note that I’m writing this as an accounting professional in the United States. By their very nature, my observations will be US-centric. But the truth is that the underlying concept is the security of sensitive information, […]

MS-DEFCON 3: I wish we had a level 2.5

ISSUE 23.04.1 β€’ 2026-01-27 By Susan Bradley The January updates present no issues for some, but lots of issues for others. I’m always hopeful of giving everyone some time every month to apply updates after we’ve vetted them. This month, I can lower the MS-DEFCON level to only 2.5. Unfortunately, we don’t have that, so […]

AI in Gmail?

Before I tell you how to turn off AI in Gmail – first a word.Β  Anytime you read β€œthis vendor is reading my private emails,” stop. Email is not secure. Not ever. Never was. If you need to hide a private conversation, email is not the thing to use. Now on with the steps: Log […]

Are we ready for changes in tech?

ISSUE 22.46 β€’ 2025-11-17 ON SECURITY By Susan Bradley Since we first started using technology, we’ve had to deal with change. We’ve gone from a time where having a computer was unusual to a time where having a computer in your pocket is normal. Or nearly normal. Because businesses are facing more and more threats […]

How to Configure SPFv1: Explained for the Masses

Kent Ickler and Derrick Rauch* // Sun Protection Factor Err… wait a second. Sender Policy Framework Ladies and Gentlemen of the class of 1997, Wear Sunscreen…I will dispense my advice, […]

The post How to Configure SPFv1: Explained for the Masses appeared first on Black Hills Information Security, Inc..

Bypassing Two-Factor Authentication on OWA & Office365 Portals

Beau Bullock // Full Disclosure:Β Black Hills Information Security believes in responsible disclosure of vulnerabilities. This vulnerability was reported to Microsoft on September 28th, 2016. As of the publication date of […]

The post Bypassing Two-Factor Authentication on OWA & Office365 Portals appeared first on Black Hills Information Security, Inc..

5 Reasons for Mailvelope & Easy Instructions

Gail Menius // My husband set me up with GPG and Thunderbird and it was too hard. Ethan said it was cool. Lots of people gave it good reviews. It’s […]

The post 5 Reasons for Mailvelope & Easy Instructions appeared first on Black Hills Information Security, Inc..

❌