- Home
- December 2008
Latest Posts
How to erase an old hard drive before giving it away
An executive asks: I need to erase my old hard drive before I give my old PC to a friend. What is the best way to do this? Of course, the best way is to have a qualified IT security professional do this for you. Still, if you want to do it yourself, here is […]
Continue reading How to erase an old hard drive before giving it away7 quick tips about setting up your new computer
An executive asked me today for quick advice on setting up his new personal laptop. Below are 7 tips: 1) If you didn’t buy XP with the laptop, you may want to go buy a copy and install XP Pro instead of Vista but you may have some drive issues to deal with (or not). […]
Continue reading 7 quick tips about setting up your new computerGoing through an IT audit can be easier than you think
The keys to having a good audit experience are many. One of the biggest ones is to simply relax! Unless the audit state mandated following your failure to comply with some regulation, then the review can be enjoyable.
Continue reading Going through an IT audit can be easier than you thinkMicrosoft releasing important patch Today at 1pm Eastern
Early this week a major bug was discovered in Microsoft’s Internet Explorer – IE – that would allow code imbedded in web sites to potentially exploit the computers who visit those sites. This has many people wondering if they should use a different browser besides IE. Some people choose to use a different browser other […]
Continue reading Microsoft releasing important patch Today at 1pm EasternShould you have an IT audit before or after you upgrade your network?
The best answer, of course, is both. However, if you are only going to have one audit, most people think it should be AFTER your own IT professionals have implemented the very best solutions they know. This can be a costly mistake.
Continue reading Should you have an IT audit before or after you upgrade your network?Time and money wasters plague many IT professionals. This hurts your entire organization
In these economic times, it is even more important to be sure you are allowing your IT professional to be as productive as possible. Whether you have internal IT professionals or utilized outsourced IT, see if any of these time and money wasters apply to your IT professional: Time and Money waster # 1: Constant […]
Continue reading Time and money wasters plague many IT professionals. This hurts your entire organizationRecent Blog Posts
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom