April 3, 2018

We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So BEFORE you connect to any free, public WiFi, make sure the connection is legitimate. It’s not uncommon for hackers to set up fake clones of public WiFi access points to try and get you to connect to THEIR WiFi over the legitimate, safe public one being made available to you. Before connecting, check with an employee of the store or location to verify the name […]


Read more.
March 30, 2018

There is no doubt about it – Windows 10 is here, and previous Windows versions will eventually be dropped from Microsoft support. Anyone who buys a new PC other than a Mac will most certainly be using Windows 10.  So let’s dig in and take control! NOTE! – DO NOT make these adjustments on a company-owned PC!  You will become very unpopular with your in-house PC support people! ALSO – Much of this discussion applies to Windows 10 Pro .  Windows Home users will need to make some changes via regedit, which deserves a page of its own. read more


Read more.
March 19, 2018

If you’re using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom. Further, over 7 MILLION Dropbox accounts have been hacked, giving cybercriminals a path into the company’s network. This is even MORE important if your company has access to and/or stores financial, medical or other sensitive data. Using file-sharing applications like these are a clear and direct violation of data breach and compliance laws. […]


Read more.
March 13, 2018

So, you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you are, only to discover no one has turned it in. What do you do? That depends on what precautions you have (or haven’t!) taken. First, if you’ve properly encrypted your data, password-protected the access to your device and shut down and logged off all key applications, you’ve got a bit more time to respond. But the first thing to do, […]


Read more.
March 6, 2018

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely. That way you don’t have it sucking up processing speed AND leaving the door open to hackers and malware. I especially hate games! Since, most of the time, I deal with someone’s business computer, games get in […]


Read more.