Safety Tips if Your “Traveling Companion” Is Your Lap Top…by DStringer

Hitting the road with your computer opens the doors to a whole world of potential security problems, both physical and software-based, but don't worry. They're all manageable. Remember, the weakest link in your security will usually be you—as long as you don't put yourself, your computer, or its data at undue risk, you should be just fine even if you have to work from a library or a coffee shop, or connect to whatever Wi-Fi you find to get some work done.

PRIVATE EYES?? WHO CAN REALLY SEE YOUR TEXTS?? by DStringer

They’re everywhere: in cars, shopping malls, and restaurants, even at family and professional sporting events.  They are so common place these days, I'm not sure I know anyone who doesn't own one...the "attached at the hip" CELL PHONE!!  Have you noticed, though, how often a wireless phone isn’t being used to actually talk to another person.

SECURE IT WELL…PROTECT YOUR CELL by dStringer

Unless you're a hermit, you are out and about every day, sometimes several time a day.  And each time you venture outdoors, whether it's to a meeting, the grocery store, a concert, sporting event, or on vacation, it's an occasion for something to happen to your mobile phone or the information in it.

UNLOCKING THE MYSTERIES OF THE “CLOUD” by DStringer

"Cloud Computing" is definitely the buzzword "De Jour"...but there are very few of us who really understand what this is and how it works.  So here is a little "Cloud 101" to hopefully allow a little better understanding of this phenomenon.

"Cloud Computing"  means that instead of all the computer hardware and software you're using sitting on your desktop, or somewhere inside your company's network, it's provided for you as a service by another company and accessed over the Internet, usually in a completely seamless way.

HUMANS ARE THE WEAKEST LINK…by dstringer

Internet usage is growing dramatically, but the vast majority of internet users don’t have any security backgrounds. Neither do a large majority of companies care about information security and the severity of any attack that could harm the valuable assets of these companies.

IS DATA BACK-UP PART OF YOUR “DISASTER” KIT?? by dorothy stringer

In the news recently, it seems there have been more natural disaster phenomenons globally, occurring almost daily.  Earthquakes, Tornadoes, Floods, Fires.  We are all warned and drilled on the importance of preparing for and keeping a "disaster kit"...in our case in Southern California, it is known as an "Earthquake Kit". The essentials are packed in the kit.

BIG BROTHER IS INDEED WATCHING…by dstringer

Recent events in Washington would definitely support the fact that the already massive scale of surveillance in place to keep us safe is not enough. Now, the governmet believes it needs greater access to our computers, even if that means majorly stepping all over our privacy and constitutional rights.

MEET GEORGE JETSON…by dstringer

 

I can remember, less than 30 years ago, one of my first employments was at a department store.  I started off on the sales floor, and graduated to director of Marketing and Display.  I was, however, still on the sales floor when our company graduated to the world of computer technology, sometime in the early 1980's.

The main thing I will always recall was the HUMONGOUS contraption setup in what was known as.

THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer

The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys."  Well, yes and no.  While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.