- Home
- July 2009
Latest Posts
Keep your family computer like new forever
When you get a new computer, it runs fine. Over time, it can slow down and become infected. Microsoft offers a free tool that can protect your computers. It is called Windows Steady State. With Steady State, every time you restart your computer, the computer will return to its original, hopefully pristine, condition.
Continue reading Keep your family computer like new foreverDoes your signature line contain a phone number?
Do you carry a phone that also receives e-mail? Do you ever receive an e-mail and then want to call the person back? If they put their phone number in their e-mail signature line, you can click the e-mail to place the phone call.
Continue reading Does your signature line contain a phone number?Short useful Forbes article about CEO’s and cybersecurity
What CEOs Don’t Know About Cybersecurity by Andy Greenberg. A new study hints at how often cyberthreats aren’t communicated to the boss. http://www.forbes.com/2009/07/13/poneman-cybersecurity-breaches-technology-security-poneman.html?partner=email Many thanks to don@soundtraining.net for passing this along – he provides excellent IT training.
Continue reading Short useful Forbes article about CEO’s and cybersecurityHow to Keep Turnover Low and Employees Motivated in the Midst of Economic Turmoil
As a business owner or manager, your job is to get things done through your employees. To do this, you need to be able to motivate your team. However, in today’s age of downsizing, reduced employee loyalty, and the absence of job security, many business owners are finding that employee motivation is a concept that’s […]
Continue reading How to Keep Turnover Low and Employees Motivated in the Midst of Economic TurmoilHow Your Sales People Can Use Technology to Double Their Sales
Is your sales team working as effectively as they can be? In most companies, the answer is no. While you may have experienced a positive gain despite the economic slowdown, there’s likely much more business your sales team could have closed if they only had the technology tools to stay productive.
Continue reading How Your Sales People Can Use Technology to Double Their SalesUsers are one of your most vulnerable assets
Criminals can access your network when your users unknowingly make it easy for them.
Continue reading Users are one of your most vulnerable assetsYou may never know your computer is infected
Think about it. If a cyber criminal is monitoring your computer to steal your passwords, they do NOT want you to know.
Continue reading You may never know your computer is infectedRecent Blog Posts
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
- Your 2021 Budget Should Accurately Differentiate IT Expenses from Cyber Risk Management.
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom