Why You Should Close Your Browser After Logging Out of a Service

When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will recommend that you also close your browser. The advice is very common but can be a slight annoyance. You will usually want […]

Continue Reading This Post

Common Myths and Mistakes About WordPress: What You Need to Know

WordPress is an online content management system (CMS) that is used to power some of the most popular sites on the web. However, some businesses fear that WordPress has too many security problems, lack of disaster recovery and is difficult to administer. In reality, many of these risks are mitigated by simple maintenance and best […]

Continue Reading This Post

What is Bring Your Own Device in an Enterprise Setting?

The expansion of Information Technology (IT) into the business world has made it possible for employees to use smartphones, laptops and other mobile devices to stay connected to the enterprise. Businesses have two choices: issue devices owned by the company; or have the employees bring their own devices (BYOD). Predictions are that by 2014, 90 […]

Continue Reading This Post

Internet Privacy: Does It Still Exist?

At its inception, the Internet was seen as a haven for privacy seekers. The first news of someone getting fired for a picture he posted online was the shot across the bow for this idea. It became apparent that without the proper precautions, there was actually no privacy to be had. Instead, even a quick […]

Continue Reading This Post

How Computer Viruses Work

With Winter approaching, it’s time to start to thinking about how to protect yourself from the dreaded Winter flu. This year, I’d like you to include your computer in your contingency plan.  What will you do in the event of a virus? How will you insulate yourself from whatever’s going around? Nobody likes being sick. […]

Continue Reading This Post

Risks of Logging Into Other Sites with Your Social Media Passwords

Convenience is king. We have the option of signing in to many Web sites – from blogs to online communities to business sites – by logging in with Facebook, Twitter, and many other social-media sites. But is it safe? Here’s the scenario: You occasionally visit “downloadsRus.org” (not a real site), but can’t seem to remember […]

Continue Reading This Post

Data Security at Data Centers

Q: Today so much of our personal and professional data is housed not on our own computers but in large data centers run by third-party companies. What are some of the issues at play with data security and how do we know our data is safe? Company data stored within data centers is typically very […]

Continue Reading This Post

Ways to Protect Your Twitter Account

No doubt about it. Twitter is a great and useful tool. It cuts down barriers and makes everyone from political leaders to reality TV stars accessible. It champions the everyman. It helps raise the profile of individuals, brands, issues and products alike. Got a campaign you want to back? Use Twitter. Need to do a […]

Continue Reading This Post

Which is Better: Closed or Open Source Systems?

There are few tech debates that have lasted longer without a satisfactory resolution than the debate over whether open or closed source software is ideal. Open-Source Programs Have More Developers Advocates of open source software point out how a multitude of collaborators can work together to improve the product. Many open-source programs have programmers creating […]

Continue Reading This Post

Internet Security: Why It’s Essential That You’re Protected

Protecting your computer has been a necessity for many years now and has become increasingly important with the rise of broadband and now superfast broadband. On a personal level, inadequate protection of your machine can lead to identity theft and your bank account becoming emptied; on a national level, there’s also the threat of hacking […]

Continue Reading This Post