How Computer Viruses Work
With Winter approaching, it’s time to start to thinking about how to protect yourself from the dreaded Winter flu. This year, I’d like you to include your computer in your contingency plan. What will...
View ArticleInternet Privacy: Does It Still Exist?
At its inception, the Internet was seen as a haven for privacy seekers. The first news of someone getting fired for a picture he posted online was the shot across the bow for this idea. It became...
View ArticleWhat is Bring Your Own Device in an Enterprise Setting?
The expansion of Information Technology (IT) into the business world has made it possible for employees to use smartphones, laptops and other mobile devices to stay connected to the enterprise....
View ArticleWhy You Should Close Your Browser After Logging Out of a Service
When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will...
View ArticleCommon Myths and Mistakes About WordPress: What You Need to Know
WordPress is an online content management system (CMS) that is used to power some of the most popular sites on the web. However, some businesses fear that WordPress has too many security problems, lack...
View ArticleWould You Know if You’ve Been Targeted by an Identity Thief?
Chances are good there’s enough information about you online at this very minute that someone so inclined could steal your identity (kick that up to “excellent” if you’re an avid user of social media...
View ArticleThe Top 5 High Paying Technology Jobs of 2013 and How to Score Them
The technology sector is growing at a rapid pace even while other areas of the economy are struggling. Many jobs will need to be filled in order to meet the demands of the current tech job market....
View ArticleSecurity Risks On the Internet of Things: Will They Hack My Car?
Charlie Miller has been hacking computers and phones for over a decade. His ends aren’t nefarious, however: he’s a security researcher working to expose vulnerabilities that will ultimately make our...
View ArticleThe Best 5 VPNs for Google Chrome
Google Chrome has taken the world by storm as the most popular web browser. With 51 percent of the world’s internet users now on this platform, Chrome has built a dedicated following with desktop and...
View ArticleWifi On the Go: How to Choose the Best Travel Router
As we continue to integrate more and more gadgets into our daily workflows--including smartphones, tablets and laptops--multiple devices often come with us while we're traveling. And in today's age...
View ArticleWhy You Should Close Your Browser After Logging Out of a Service
When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will...
View Article