Tips for staying on top of your inbox
How to Get the Junk Out of Your Inbox Are you drowning under all the email you get in your inbox every day? Is it tough to sift out the relevant emails from the spam? Are you missing important work emails from your employees, co-workers, or clients? Here are some tips on how to cut […]
Oh $#!+: Your website got hacked — now what!?
used with permission from HP Tech@Work What do you need to do to get your site back online? Three steps to recovery. After the initial panic subsides, your mind starts racing and you find yourself asking the question, “What do I (or my IT folks), need to do to get our site back online?” Read […]
3 Security Advantages of Managed IT Services
Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and IT staff to work on more important projects than daily […]
How to avoid malicious hyperlinks and practice link safety
used with permission from Tektonika (HP) Whether it’s in reference to an interesting article or information on a great new restaurant, “send me the link” is a commonly used phrase in the internet era. This is equally true in professional circumstances, where coworkers communicate and collaborate as a part of their jobs. In today’s threat-filled […]
December 2017 Business Continuity Tip: Better be wary: Avoid scams this holiday season
The holidays have begun and that means many of us are doing our holiday shopping online. While avoiding the large crowds and busy traffic is great, be wary of holiday shopping scams online. This is a lucrative time not only for online retailers, but also cybercriminals. Only use websites that are secure. Look for the […]
SSN for authentication is all wrong
used with permission from Microsoft Secure by Diana Kelly, Program Manager Evangelist Unless you were stranded on a deserted island or participating in a zen digital fast chances are you’ve heard plenty about the massive Equifax breach and the head-rolling fallout. In the flurry of headlines and advice about credit freezes an important part of […]
Face it, privacy affects us all
used with permission from IBM Big Data & Analytics Hub by Richard Hogg At the end of September, I presented at the annual InfoGovCon17 conference, in sunny Providence, RI. I introduced information privacy, a key part of unified governance that’s accelerated by the pending EU GDPR that goes live in less than 240 days. I […]
The dark web: What your business needs to know
used with permission from FTC.gov by John Krebs You’ve heard about the “dark web” and wondered how it affects businesses — including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines about high-profile data breaches have added even more urgency to the discussion. […]
Credit card security courtesy of your body
used with the permission of http://thenetwork.cisco.com by Anne Field Increasingly, banks and credit card companies are trying out biometrics to authenticate a cardholder’s identity. Online credit card fraud is soaring. And, it’s still pretty darn prevalent in the offline world. In fact, global credit card fraud will exceed $35.54 billion in 2020, up from $16.3 […]
Businesses beware: Researchers spot bug in Wi-Fi network encryption
You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK — Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does it warrant further action at your company? Absolutely. If you or anyone at your business uses a smartphone, laptop, or […]
How to speed up Wi-Fi in airplanes
used with permission from Norton by Symantec by Christina Schubert When traveling in a pressurized cabin about 35,000 feet above the ground, one doesn’t give much thought to the engineering marvel that is the aircraft. Airplanes defy gravity and challenge physics. Yet these amazing feats don’t get much attention. What most passengers are concerned about […]
How 3D printing is transforming (and elevating) design
used with permission from HP by David Tucker Until the rise of the First Industrial Revolution, products were generally handcrafted and made-to-order as needed. Few things were made in advance to warehouse for later sale, supply chains (or what passed for them) were scrappy at best, and production speeds were painfully slow. Because products were […]