Yearly Archives: 2014

Data recovery tools that could save the day

There are a lot of ways to lose critical data — like hardware failure, an OS crash, a user error, or a malicious attack. If it happens to you, one of these tools may help you get that data back. … Continue reading

Posted in New Technical | 1 Comment

Expect massive spikes in global security threats for 2015

Increases of global information security threats remain as much a certainty as death and taxes, at least according to the latest Information Security Survey from PWC. That report, which was published in October, highlights several troublesome trends and provides valuable … Continue reading

Posted in Open Discussions | Leave a comment

Five apps for House Cleaning your systems

All systems, be they desktops, laptops, smartphones, or tablets need a little cleaning now and then. Sometimes the cleaning is just a simple riding various caches or deleting unwanted files. Other times, the cleaning is deeper and more involved. No … Continue reading

Posted in New Technical | Leave a comment

Five Free web-based apps for Real-time graphs

Creating graphs is easy — grab your favorite spreadsheet program, enter some data, and use the chart wizard. What’s more difficult is creating those graphs to be published on the web based on dynamic data. Plenty of options are available … Continue reading

Posted in New Technical | Leave a comment

Russian hackers prove poor security practices

In what may be the largest compromise of IT security in history, Russian hackers have amassed more than 1.2 billion passwords and user names, creating what may become havoc among IT security professionals and IT security vendors, according to an … Continue reading

Posted in New Technical | Leave a comment

Two Factory Authentication – The New Normal of Passwords

Many of the recent data breaches have exposed passwords as a common denominator. And as you know, if someone gets hold of your password, then your account—and all the data in it—is vulnerable. But there’s an easy way to protect … Continue reading

Posted in New Technical | Leave a comment

10 things you can do to make Mobile device more secure

This list of security do’s and don’ts will help you safeguard your Mobile device and protect that valuable data. 1: Set up your lock screen This should be a no-brainer, but I’m always shocked to see how many mobile users … Continue reading

Posted in New Technical | Leave a comment

Five outstanding Open source audio editors

A solid audio editor might not seem to belong at the top of your must-have list. It is, however, a tool that can go a long way toward helping you with your business. How? With an audio editor, you can … Continue reading

Posted in New Technical | Leave a comment

Ransomware, Cryptolocker, hits systems

Cryptolocker, a ransomware Trojan virus, encrypts a victim’s files and then demands payment for the key, and is indicative of the lengths nefarious types will go to for a few dollars of ill-gotten gains. Ransomware is on the rise and … Continue reading

Posted in New Technical | Leave a comment

Net Neutrality: What It Is and Why You Should Care

Net neutrality is in the news again, but if you’re like most people, you aren’t even totally sure what it is. With a recent U.S. Court of Appeals decision on Net neutrality poised to change the face of the Internet, … Continue reading

Posted in Open Discussions | Leave a comment