computer security tips

Bookmark the LEGITIMATE websites you frequently visit

You probably have seen it before – or not – but there are sneaky bait and switch tricks used by hackers. It works like this: they register and set up a fraudulent website that is a very close misspelling of a legitimate one. For example, www.amercanexpress.com (don’t go there!) instead of www.americanexpress.com. If you accidentally

Encrypt That Flash Drive

Dawn of the USB Drive Flash drives are ubiquitous in today’s digital society. It is an easy, cost-effective way to transfer large amounts of data from computer to computer. With devices reaching 256GB of storage, users are storing more and more data on these small handy plastic devices. But what happens when that device is

Beware of Scareware Computer Viruses

Few days ago, a court in the United States has announced a judgment of more than $163 million against defendants in the FTC case agains “scareware” operation. This case had started on December 2, 2008, the U.S. Federal Trade Commission (FTC) filed a Complaint in federal court against Innovative Marketing, Inc., ByteHosting Internet Services, LLC,

Could you be breaking the Law? Yes – if you are not archiving your business emails.

It is 2011, and most of our business communications and negotiations are now performed via email. Your vendor’s purchase orders, invoices, agreements, employee communications are mostly handled via email. International clients and vendors prefer online communication to phone and traditional mail. Are you a victim of a Recycle Bin Syndrome? We’ve all been there. The

Major Computer Attack – warns DHS

Cybersecurity experts have long warned that computer hackers could potentially target electric power sources, such as power plants and electrical grids, and that these attacks could affect vital infrastructures, including hospitals and water treatment plants. Department of Homeland Security Secretary Janet Napolitano said at the cybersecurity event sponsored by the Washington Post, that a major

5 Security Tips for Your Smartphone

Besides of my take on these basic five-points tips, there is a growing plethora of advice on securing smartphones. And there is a reason why: we are all overly connected to the wireless world, and Business Intelligence makes it’s way into our mobile devices. Our phones, tables and other mobile devices all have a chock

Are your passwords secure enough?

Creating a strong password may seem like a pretty simple concept. In fact, many websites even tell you when your password is “good” or “strong”. Unfortunately, many people still overlook the vital rules to creating a strong password. Always make your passwords longer than six characters Include a blend of uppercase, lowercase, numbers and special

IT Support NJ - Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution industry awards
IT support NJ - Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution IT industry awards
Scroll to Top