Linked Account Horror Stories
In the past, right here on this very blog, articles on password security have talked about the use of the same password or login across multiple platforms. In today’s world of linked accounts, such password security can be very dangerous. However, a new type of attack related to social engineering can lead to attacks once […]
So, you want to be your own IT professional?
Information Technology (IT) is the practice of using computers to store, retrieve, manipulate, transmit, and communicate data. Humans have been doing this since writing was first developed back in about 3000 BC. IT encompasses technologies such as computer hardware, software, electronics, internet, e-commerce, computer services, networks, telecom equipment, and much more. And IT professionals deal […]
What happened to Office Starter?
The Microsoft Office suite is a very powerful tool. Everybody knows that. In fact, a large number of clients define their email by “Outlook” instead of the company or platform that actually defines their email (Exchange, Gmail, random web service). There is no doubt that Excel and Word are wide-ranging in their impact and the […]
Christmas 2013 – Do I get a smartwatch?
Christmas time is a wonderful time of year for technophiles. Every new gadget has a new model or version ready for purchase. From video games and TVs to cell phones and…now…watches. Say goodbye to the Casio of the past, clocks for your wrist have officially entered the 21st century. We have seen the future in […]
Has Someone Offered to Hold Your Data… for a Fee?!
Christa Hartman recently posted a blog about the threat of ransomware. Check out the informative two part blog here and here. Please be aware of a new version that has recently become more prevalent infecting computers across the internet. The United States Computer Emergency Readiness Team released a report documenting CryptoLocker Ransomware. Ransomware has become […]
What if your PC was held for ransom… Part 2
Recently, I posted a blog on ransomware – a form of malicious software that can hold your computer and data files hostage until a ransom is paid. I listed a couple things you can do to minimize the risk of being infected by these types of attacks. And at the end, I left you with […]
I want dual-monitors. But how?
The look of dual monitors when using a computer is very cool. It is enticing. All that room is just sitting there waiting to be used. Watching a video while reading email, keeping two spreadsheets open at the same time, copying documents, the available uses are endless. With the size of monitors these days, you […]
What login information? Part 2
In Part 1, we talked about password management and controlling business processes. Have you considered the foundation of your business? You may have no plans to leave your current IT service. But, like we mentioned in our previous post, suppose something happens outside of your control (or their control). Make sure that you control business assets […]