The Definition of “Password”…by dStringer

PASSWORD

a secret word or phrase that must be used to gain admission to something.

a string of characters that allows access to a computer, interface, or system.

 

It's just obvious that one of the main focuses of an I.T.company is cyber security.

How to speed up Google Chrome

Ever since its initial release back in 2008, Chrome has been one of the most popular and widely used browsers in the world. Its speed and performance are top notch when compared to other browsers available in the market. As with other browsers, however, Chrome can be slow at times due to some of its features and extensions.

WE GOT YOUR BACK…UP, THAT IS by dStringer

We have dedicated many posts to Disaster Recovery and Business Continuity Planning. We have talked about how vital this process is in protecting and saving your business from any disaster, big or small.  Of course, one of the necessary components for a buoyant BCP is data backup.

THE DOMINO AFFECT…by dStringer

I'm sure many of you watched with amazement, and a bit of fear as did I this past weekend, as the snow just kept on falling in New York and other eastern states.  This latest weather phenomenon literally paralyzed most of the eastern seaboard and was severely felt in many surrounding states as well.

GIVE YOUR BUSINESS ITS BEST “SURVIVAL” SHOT…by dStringer

Natural and man made disasters and chaotic events underscore the challenges of  disaster recovery in the real world. Having a comprehensive business continuity plan isn't just an IT concern; though. Nothing less than the survival of your company is at stake.

Protect Your Privacy with Browser Extensions

Protecting yourself, your employees and your business when you’re using the Internet is mandatory if you want to remain safe, productive and profitable. The current climate dictates that we all need to ramp up our online security measures thanks to the proliferation of phishing scams, hacks and fraudulent activity.

BUSINESS CONTINUITY…MYTHS AND MISCONCEPTIONS by dStringer

Companies today face an unprecedented number of problematic occurrences. The frequency and severity of weather-related events seem to be increasing and reliance on a complex network of technology and supply chains is expanding. Both trends leave businesses vulnerable to a variety of existing and emerging risks.

HOW ABOUT A NERDY YEAR IN REVIEW? by dStringer

We are rapidly closing in on the end of 2015...and with all the security breaches, disaster preparedness, corporate hackings and everything else I've blogged about this past year, I thought we'd dedicate our last blog of the year to a fun, little review of the ten best "nerdy' gadgets of 2015...

So let's begin, shall we??!!

10. SAMSUNG GALAXY NOTE EDGE

In Samsung's vision of the electronics future, curved is the new flat.

COWABUNGA…SURFING’S UP! by Dstringer

In several blogs now, we have discussed Social Engineering and other means of compromising security in this technical age.  While technological advancement has no doubt made life much more interesting and convenient, it has also caused much more danger and frustration.

I DON’T NEED NO STINKIN’ TECH SUPPORT…by dStringer

In today's "instant gratification" society — in which heightened customer expectations and 24x7 accessibility demands really burden small business — little time remains for much else. Small businesses often don't have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips.