Vulnerability Scans… Penetration tests… Risk Analysis… Huh?
All things security have become huge industries in the computer world. People are rushing to define their business and businesses are finding new (and expensive) ways to protect their information. As the importance of IT and computer development for businesses has grown, the idea of understanding risks and protecting digital information has become its own […]
LastPass Security Breach
You probably have heard by now that LastPass, one of the leading password management services, had a security breach last week. There are a number of media outlets reporting the story, including this article from PC World. LastPass has always been committed to the privacy and security of the data they store for their customers and […]
Check your oil… Change the batteries in your smoke detectors… Review your backups and passwords… Preventative maintenance or regular housekeeping can go a long way to saving yourself money (and gray hairs) should a problem arise. In nearly every walk of life, people regularly check-up on the status of various aspects of their work and personal […]
Wireless Options Falling from the Sky
With the recent kerfuffle over the Comcast/Time Warner merger, the disgust aimed towards large telecommunication companies has reared its head again. Until just recently, most people would be beholden to certain corporations when purchasing internet service, cable service, or cell service. There are limited companies with limited packages available for someone shopping for one of […]
Master Your Internet Capacity
I am not going to lie. As a Georgia boy that is a big golfer, there is no other week more important to me than the The Masters. But, as someone also involved in technology and providing support for a wide range of clients, I am intrigued by the technological advances of a golf club […]
Mobile devices need security, too
One thing that seems to escape many businesses is the idea that protection and security extends to all devices at an organization. Everyone takes time to protect offices with locks, desktops with screensavers and passwords, and laptops with cable attachments. But, the phones or mobile devices that you use for email and other business related functions […]
Internet Explorer – Vulnerabilities exposed. Again.
It is time for another technology blog post and, unfortunately, I am going to revisit an old topic: Internet Explorer. Mozilla Firefox and Google Chrome have long been suggested alternatives for internet browsers for a variety of reasons. The newest reason would be the identification of a universal flaw in Internet Explorer, even if your […]