Jeff Brown

Jeff Brown

Guest Author


Guest Author Jeff Brown is an IT industry veteran who started working in IT in 1994. He has a Bachelor of Science in Engineering Physics with a specialization in Electronics from Murray State University. He also holds several professional certifications including MCSE, CNE, and CLP. His extensive background in network support and planning, network security, data backup and recovery, tech support and hardware support has benefited numerous businesses in the Tri-State.

Recent Articles by Jeff

What is the Dyre Banking Malware Phishing Email?

In the world of cyber-security, you cannot relax your guard, even for a moment. In mid-October 2014, discovery of a phishing scam aimed at obtaining sensitive user account credentials for a number of online services, including banking services, prompted a warning from US-CERT outlining the particulars of this scam. Known as Dyre or Dyreza, this banking malware is a phishing attempt to

The Basics of an IT Disaster Recovery Plan

What would spell disaster for your business? A powerful storm that takes out a large percentage of your equipment? A fire or flood that renders your facility unusable? Or would the larger disaster being wholly unprepared for a disaster and not having a plan for recovery in place? You may never need to use your disaster recovery plan, but that’s no excuse

Microsoft Security Essentials Alert – Recognizing a Spoof of Microsoft’s Anti-Virus Software

You’re well into your morning routine – coffee in hand, checking your email, reading Facebook – when a security prompt pops up on your computer screen. You’ve never seen this sort of alert before, but right at the top, it says “Microsoft Security Essentials Alert.” Microsoft Security Essentials, or MSE, is Microsoft’s free anti-virus software available as a download on Microsoft’s website.

An Apple ID Phishing Scam

Suppose your Apple ID login led you to another screen that asked you to provide such information as your full name, your credit card number (including expiration date and verification code), date of birth, phone number, and your mother’s maiden name… would you provide that information? I suppose whether you’d share this sort of information would depend upon how trusting you are

Windows 7 vs. Windows 8 – Choosing a Replacement for XP

If you haven’t heard by now, Microsoft is set to end support for the wildly popular XP operating system on April 8th. We’ve been talking about this end-of-life date here at Lieberman Technologies for a while now, and we’ve helped a number of businesses make the transition to a new operating system. If you’ve been putting off making the switch to a

What is a UPS and How Does it Protect Your Network?

The weather here in the Tri-State can be unpredictable. In fact, some are apt to say, “If you don’t like the weather here, wait five minutes – it’ll change.” At no time is this more accurate than during the warm weather months, where a thunderstorm can appear in the middle of a beautiful, sunny afternoon. Whether you fear or welcome a thunderstorm

How To Change Your Email Signature in iOS7

If you’re one of the millions who are using mobile devices to take their work with them, then you know how important it is to have a professional email presence no matter what device you use. Part of that presence is a professional signature that lets you send messages from your phone or tablet with the same contact information as your desktop

A Cryptolocker Ransomware Survival Story

If you’ve been following the news recently, you’ve probably heard of the latest and nastiest instance of cybercrime out there today:  Cryptolocker. Thousands of individuals and businesses worldwide have been hit with this scam, leading security experts to label it as the new reality in cybercrime. Cryptolocker is a class of malware known as ransomware, which infects a computer by restricting access

How To Erase Data from an Old Computer or Phone

Ah, the joy and excitement of a new computer or cell phone. Shiny, new, pristine – a blank slate on which you will inscribe your personality and interests, on which you will create and communicate and learn and play, and on which you will put a lot of personal information. Processes will run faster, things will download more quickly, and you are

5 Things to Do Before You Recycle That Old Phone

So, you got a new phone. And while you’re excited about your new gadget, with all of its fancy features and cool new case, you still have unfinished business with your old phone. Maybe you already have plans for your old phone. Maybe you’re going to pass it on to someone in your family, like your teen who’s been hinting at wanting

Next Page »