Master Your Internet Capacity

I am not going to lie. As a Georgia boy that is a big golfer, there is no other week more important to me than the The Masters.  But, as someone also involved in technology and providing support for a wide range of clients, I am intrigued by the technological advances of a golf club […]

Yes, that may have been a computer attack.

It is time to, once again, review just how easy it is to find yourself at risk to an attack. Yes, you are just a lowly citizen using a computer for regular day-to-day business. To you, nothing out of the ordinary happens to your computer. And, with that in mind, why on earth would Chinese […]

Mobile devices need security, too

One thing that seems to escape many businesses is the idea that protection and security extends to all devices at an organization. Everyone takes time to protect offices with locks, desktops with screensavers and passwords, and laptops with cable attachments. But, the phones or mobile devices that you use for email and other business related functions […]

Internet Explorer – Vulnerabilities exposed. Again.

It is time for another technology blog post and, unfortunately, I am going to revisit an old topic: Internet Explorer.  Mozilla Firefox and Google Chrome have long been suggested alternatives for internet browsers for a variety of reasons.  The newest reason would be the identification of a universal flaw in Internet Explorer, even if your […]

A default password is no password at all.

As the calendar turns to 2015, it is time to review one of the easiest steps someone can take to reduce security threats to their technology devices and applications: change your password. In the past, we discussed the use of “easy” passwords. In addition to setting complex passwords, users also need to realize that default […]

7 January 2015
Comments: Comments Off

Podcasts? Don’t be afraid.

You know, if you are tired of listening to the same old radio stations, there are other options out there. You may want to venture out into of the world of “podcasts”; it can be done….and you can survive the adventure. Podcasts can best be described as episodic radio programs. A new-fangled word, that first […]

Two-Factor Authentication. What in the heck is that? And why should I use it?

In the past, we have posted several blogs related to password security. You can check out some of the past blogs here. Unfortunately, these days, even a secure password may not be enough to stop nefarious individuals. Whether it is a trojan that gets into your computer through malware and steals a password or somebody […]

Wipe Data From Your Old SmartPhone

So, here we are again.  Christmas is right around the corner and retailers are advertising like crazy in hopes of getting their products on the top of your Christmas list.  If you are like me, a new smartphone is at the top of your list.  Ok, to be honest, Christmas came a little early for me […]

Set your clocks back. Check your Crypto protection!

Since we have reached the time of the year to shift our clocks by an hour, it is a great time to talk about some other housecleaning duties that you need to remember. Check the batteries in your smoke detectors and take a few moments to remember the security precautions needed to protect yourself against […]