Phishing emails on steroids!
At last count, we have covered, or at least mentioned, phishing email scams in at least 13 of our tech blogs since 2010. One in particular phishing email scam blog explains what they are, their inherent dangers, how to spot them, how to avoid them, and even what to do to minimize the damages if you fall victim […]
Internet Explorer – Vulnerabilities exposed. Again.
It is time for another technology blog post and, unfortunately, I am going to revisit an old topic: Internet Explorer. Mozilla Firefox and Google Chrome have long been suggested alternatives for internet browsers for a variety of reasons. The newest reason would be the identification of a universal flaw in Internet Explorer, even if your […]
Pay Attention to Who Wants Your Information
The days of a sneaky thief stealing your purse to get your personal information are long gone. Rummaging through trash to find unshredded bank statements is just too boring. Identity thieves are so brazen that they will just come out and ask you for any information they need: bank account numbers, social security numbers, credit […]
So, you want to be your own IT professional?
Information Technology (IT) is the practice of using computers to store, retrieve, manipulate, transmit, and communicate data. Humans have been doing this since writing was first developed back in about 3000 BC. IT encompasses technologies such as computer hardware, software, electronics, internet, e-commerce, computer services, networks, telecom equipment, and much more. And IT professionals deal […]