• Travel Alert: Keyloggers Target Hotels

    Travel Alert: Keyloggers Target Hotels

    According to the US Secret Service and the National Cyber Security and Communications Integration Center, keyloggers have been making use of hotels in the Dallas/Fort Worth locations to target unsuspecting guests and steal their personal and private information. While the […]

  • Data Center Don’ts: Part Two

    Data Center Don’ts: Part Two

    We’re back with more data center don’ts with a second installment. Let’s continue where we left off. Read Part One: HERE   Lack of Documentation Is your network completely mapped out? Are you aware of everything that is going on? […]

  • Data Center Don’ts: Part One

    Data Center Don’ts: Part One

    Data center don’ts. Yes, DON’TS. While minor gaffes can be ignored and mistakes hidden (no one knows you drink the juice from directly from the carton), but mistakes can tend to have a significant impact when they occur while you’re […]

  • The Trouble with Passwords

    The Trouble with Passwords

    Oh, the trouble with passwords. It’s such a simple premise to use a password for protection, but the sheer number of passwords we have is a little overwhelming. Almost every website you use requires an account. While creating an account, […]

Latest News

Aug,2014

1 Article

hotel keylogger

Travel Alert: Keyloggers Target Hotels

No Comment

According to the US Secret Service and the National Cyber Security and Communications Integration Center, keyloggers have been making use of hotels in the Dallas/Fort Worth locations to target unsuspecting guests and steal their personal and private information. While the […]

Continue Reading »

Jul,2014

9 Articles

data center two

Data Center Don’ts: Part Two

No Comment

We’re back with more data center don’ts with a second installment. Let’s continue where we left off. Read Part One: HERE   Lack of Documentation Is your network completely mapped out? Are you aware of everything that is going on? […]

Continue Reading »

data center

Data Center Don’ts: Part One

No Comment

Data center don’ts. Yes, DON’TS. While minor gaffes can be ignored and mistakes hidden (no one knows you drink the juice from directly from the carton), but mistakes can tend to have a significant impact when they occur while you’re […]

Continue Reading »

Stealing Online Information

The Trouble with Passwords

No Comment

Oh, the trouble with passwords. It’s such a simple premise to use a password for protection, but the sheer number of passwords we have is a little overwhelming. Almost every website you use requires an account. While creating an account, […]

Continue Reading »

Security concept: Cctv Camera on digital background

Has Your Webcam Been Hacked?

No Comment

Has your webcam been hacked? Would you know if it were? While webcams are awesome and have made communication across long distances easier than ever, they aren’t without complications and dangers. Several cases of webcam hackings have shown us just how […]

Continue Reading »

stressed businesswoman looks laptop

VIDEO: I Want my Data Back

No Comment

When you lose your data, one thought comes to mind: “I want my data back!” Well, after the cursing and grieving and general anguish subsides. I call this phase my temper tantrum. On the 5 stages of data loss  scale, it’s […]

Continue Reading »

computer repair

How to Prepare for Computer Repair

8 Comments

We all know the sinking feeling in our heart at the moment our laptop decides to stop working. When pressing the power button dozens of times, praying, and finally begging the laptop to start do not create any positive solutions, […]

Continue Reading »

Jun,2014

8 Articles

backup-type

Are All Backups Created Equal?

39 Comments

Let’s talk backups.With so much out there, and so many uses dependent to a large part on the need, it’s a little overwhelming.  Are all backups created equally? Is a backup, a backup, a backup? Does it matter what you […]

Continue Reading »

fire

8 Creative Ways to Destroy Your Laptop

7 Comments

Laptops are notoriously easy to ruin. It’s almost like they don’t even want to survive. If natural selection had its way, the laptop would never have been able to replace the harder-to-destroy desktop computers. With this in mind, laptops do […]

Continue Reading »

May,2014

9 Articles

ebay

Ebay Hacked: Change Your Password NOW!

10 Comments

Ebay hacked and panic ensues. eBay released a statement yesterday, letting the public know that the internal and customer databases had been compromised earlier in 2014 and they are now urging users to change their passwords. Heartbleed? Something else? Who knows? […]

Continue Reading »

word

Data Loss: The 5 Stages of Grief

17 Comments

The 5 stages of grief and coming to terms with data loss explained. Or rather, the series of emotional stages experienced when confronted with the death of your data. Yes, your data. Because Kübler-Ross totally had this in mind.   Stage #1: Denial Maybe […]

Continue Reading »

Apr,2014

6 Articles
View by:All

Back to Top