Quantcast
Channel: Social Web Q and A
Browsing all 11 articles
Browse latest View live

How Computer Viruses Work

With Winter approaching, it’s time to start to thinking about how to protect yourself from the dreaded Winter flu. This year, I’d like you to include your computer in your contingency plan.  What will...

View Article


Internet Privacy: Does It Still Exist?

At its inception, the Internet was seen as a haven for privacy seekers. The first news of someone getting fired for a picture he posted online was the shot across the bow for this idea. It became...

View Article


What is Bring Your Own Device in an Enterprise Setting?

The expansion of Information Technology (IT) into the business world has made it possible for employees to use smartphones, laptops and other mobile devices to stay connected to the enterprise....

View Article

Why You Should Close Your Browser After Logging Out of a Service

When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will...

View Article

Common Myths and Mistakes About WordPress: What You Need to Know

WordPress is an online content management system (CMS) that is used to power some of the most popular sites on the web. However, some businesses fear that WordPress has too many security problems, lack...

View Article


Would You Know if You’ve Been Targeted by an Identity Thief?

Chances are good there’s enough information about you online at this very minute that someone so inclined could steal your identity (kick that up to “excellent” if you’re an avid user of social media...

View Article

The Top 5 High Paying Technology Jobs of 2013 and How to Score Them

The technology sector is growing at a rapid pace even while other areas of the economy are struggling. Many jobs will need to be filled in order to meet the demands of the current tech job market....

View Article

Security Risks On the Internet of Things: Will They Hack My Car?

Charlie Miller has been hacking computers and phones for over a decade. His ends aren’t nefarious, however: he’s a security researcher working to expose vulnerabilities that will ultimately make our...

View Article


The Best 5 VPNs for Google Chrome

Google Chrome has taken the world by storm as the most popular web browser. With 51 percent of the world’s internet users now on this platform, Chrome has built a dedicated following with desktop and...

View Article


Wifi On the Go: How to Choose the Best Travel Router

As we continue to integrate more and more gadgets into our daily workflows--including smartphones, tablets and laptops--multiple devices often come with us while we're traveling. And in today's age...

View Article

Why You Should Close Your Browser After Logging Out of a Service

When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will...

View Article
Browsing all 11 articles
Browse latest View live