Check your oil… Change the batteries in your smoke detectors… Review your backups and passwords… Preventative maintenance or regular housekeeping can go a long way to saving yourself money (and gray hairs) should a problem arise. In nearly every walk of life, people regularly check-up on the status of various aspects of their work and personal […]
Wireless Options Falling from the Sky
With the recent kerfuffle over the Comcast/Time Warner merger, the disgust aimed towards large telecommunication companies has reared its head again. Until just recently, most people would be beholden to certain corporations when purchasing internet service, cable service, or cell service. There are limited companies with limited packages available for someone shopping for one of […]
Master Your Internet Capacity
I am not going to lie. As a Georgia boy that is a big golfer, there is no other week more important to me than the The Masters. But, as someone also involved in technology and providing support for a wide range of clients, I am intrigued by the technological advances of a golf club […]
Mobile devices need security, too
One thing that seems to escape many businesses is the idea that protection and security extends to all devices at an organization. Everyone takes time to protect offices with locks, desktops with screensavers and passwords, and laptops with cable attachments. But, the phones or mobile devices that you use for email and other business related functions […]
Internet Explorer – Vulnerabilities exposed. Again.
It is time for another technology blog post and, unfortunately, I am going to revisit an old topic: Internet Explorer. Mozilla Firefox and Google Chrome have long been suggested alternatives for internet browsers for a variety of reasons. The newest reason would be the identification of a universal flaw in Internet Explorer, even if your […]
A default password is no password at all.
As the calendar turns to 2015, it is time to review one of the easiest steps someone can take to reduce security threats to their technology devices and applications: change your password. In the past, we discussed the use of “easy” passwords. In addition to setting complex passwords, users also need to realize that default […]
Podcasts? Don’t be afraid.
You know, if you are tired of listening to the same old radio stations, there are other options out there. You may want to venture out into of the world of “podcasts”; it can be done….and you can survive the adventure. Podcasts can best be described as episodic radio programs. A new-fangled word, that first […]
Two-Factor Authentication. What in the heck is that? And why should I use it?
In the past, we have posted several blogs related to password security. You can check out some of the past blogs here. Unfortunately, these days, even a secure password may not be enough to stop nefarious individuals. Whether it is a trojan that gets into your computer through malware and steals a password or somebody […]