Jeff Brown

Jeff Brown

Guest Author

Guest Author Jeff Brown is an IT industry veteran who started working in IT in 1994. He has a Bachelor of Science in Engineering Physics with a specialization in Electronics from Murray State University. He also holds several professional certifications including MCSE, CNE, and CLP. His extensive background in network support and planning, network security, data backup and recovery, tech support and hardware support has benefited numerous businesses in the Tri-State.

Recent Articles by Jeff

What is the Dyre Banking Malware Phishing Email?

In the world of cyber-security, you cannot relax your guard, even for a moment. In mid-October 2014, discovery of a phishing scam aimed at obtaining sensitive user account credentials for a number of online services, including banking services, prompted a warning from US-CERT outlining the particulars of this scam. Known as Dyre or Dyreza, this banking malware is a phishing attempt to

The Basics of an IT Disaster Recovery Plan

What would spell disaster for your business? A powerful storm that takes out a large percentage of your equipment? A fire or flood that renders your facility unusable? Or would the larger disaster being wholly unprepared for a disaster and not having a plan for recovery in place? You may never need to use your disaster recovery plan, but that’s no excuse

Microsoft Security Essentials Alert – Recognizing a Spoof of Microsoft’s Anti-Virus Software

You’re well into your morning routine – coffee in hand, checking your email, reading Facebook – when a security prompt pops up on your computer screen. You’ve never seen this sort of alert before, but right at the top, it says “Microsoft Security Essentials Alert.” Microsoft Security Essentials, or MSE, is Microsoft’s free anti-virus software available as a download on Microsoft’s website.

An Apple ID Phishing Scam

Suppose your Apple ID login led you to another screen that asked you to provide such information as your full name, your credit card number (including expiration date and verification code), date of birth, phone number, and your mother’s maiden name… would you provide that information? I suppose whether you’d share this sort of information would depend upon how trusting you are

What is Desktop Virtualization?

Imagine being able to access your programs and files, regardless of where you’re working and regardless of device. This is the new reality of many offices today, and it’s known as virtualization. What is virtualization? In simplest terms, desktop virtualization is the separation of the desktop environment and related software applications from the physical equipment used to access them. Where once a

Windows 7 vs. Windows 8 – Choosing a Replacement for XP

If you haven’t heard by now, Microsoft is set to end support for the wildly popular XP operating system on April 8th. We’ve been talking about this end-of-life date here at Lieberman Technologies for a while now, and we’ve helped a number of businesses make the transition to a new operating system. If you’ve been putting off making the switch to a

What is a UPS and How Does it Protect Your Network?

The weather here in the Tri-State can be unpredictable. In fact, some are apt to say, “If you don’t like the weather here, wait five minutes – it’ll change.” At no time is this more accurate than during the warm weather months, where a thunderstorm can appear in the middle of a beautiful, sunny afternoon. Whether you fear or welcome a thunderstorm

How To Change Your Email Signature in iOS7

If you’re one of the millions who are using mobile devices to take their work with them, then you know how important it is to have a professional email presence no matter what device you use. Part of that presence is a professional signature that lets you send messages from your phone or tablet with the same contact information as your desktop

How To Change Your Email Signature in Microsoft Outlook 2010

Sometimes, it’s the little things that can give us the most annoyances. As often as software gets updated, things that used to be common knowledge now have entirely new ways of getting done, and the way it used to be doesn’t apply. Something as necessary as changing your email signature, for example, gets lost in the shuffle of new menus and options. This

A Cryptolocker Ransomware Survival Story

If you’ve been following the news recently, you’ve probably heard of the latest and nastiest instance of cybercrime out there today:  Cryptolocker. Thousands of individuals and businesses worldwide have been hit with this scam, leading security experts to label it as the new reality in cybercrime. Cryptolocker is a class of malware known as ransomware, which infects a computer by restricting access

Next Page »