AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE…by dStringer

We are experiencing an epidemic.  "Hacking" or Data Breaches have become commonplace...and that's dangerous.

As the frequency of hackings has increased, so is the likelihood that you will also be involved.  You may feel that you're a sitting duck in this scenario, because, after all, even though you have been most responsible and have put every security measure of which you are aware in place, you still have no control if your data is breached due to cyber criminal activity involving a third party (EX: Target or Blue Cross).

That is not exactly accurate.

THE PROS AND CONS OF CLOUD COMPUTING…by dStringer

In researching the information for this article, it occurred to me that quite a few folks still had a limited understanding of what "The Cloud" or "Cloud Computing" really was.  So we'll start off with a basic definition...

In the simplest terms, "Cloud Computing" means storing and accessing data and programs over the Internet instead of your computer's hard drive.

Safety Tips if Your “Traveling Companion” Is Your Lap Top…by DStringer

Hitting the road with your computer opens the doors to a whole world of potential security problems, both physical and software-based, but don't worry. They're all manageable. Remember, the weakest link in your security will usually be you—as long as you don't put yourself, your computer, or its data at undue risk, you should be just fine even if you have to work from a library or a coffee shop, or connect to whatever Wi-Fi you find to get some work done.

PRIVATE EYES?? WHO CAN REALLY SEE YOUR TEXTS?? by DStringer

They’re everywhere: in cars, shopping malls, and restaurants, even at family and professional sporting events.  They are so common place these days, I'm not sure I know anyone who doesn't own one...the "attached at the hip" CELL PHONE!!  Have you noticed, though, how often a wireless phone isn’t being used to actually talk to another person.

SECURE IT WELL…PROTECT YOUR CELL by dStringer

Unless you're a hermit, you are out and about every day, sometimes several time a day.  And each time you venture outdoors, whether it's to a meeting, the grocery store, a concert, sporting event, or on vacation, it's an occasion for something to happen to your mobile phone or the information in it.

IS DATA BACK-UP PART OF YOUR “DISASTER” KIT?? by dorothy stringer

In the news recently, it seems there have been more natural disaster phenomenons globally, occurring almost daily.  Earthquakes, Tornadoes, Floods, Fires.  We are all warned and drilled on the importance of preparing for and keeping a "disaster kit"...in our case in Southern California, it is known as an "Earthquake Kit". The essentials are packed in the kit.

THIS IS NO JOKE…by dorothy stringer

Identity theft, social engineering, phishing,...these are all terms that are part of our life, whether you are aware or not.  We are so tied to our computer and the internet.  And even if you are not technically savvy, the world around you is, and because of that, your security is tied in with the world.

THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer

The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys."  Well, yes and no.  While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.