Business Computer Support Blog

How To Keep Your Laptop Secure When Using Public WiFi Hotspots

How To Keep Your Laptop Secure When Using Public WiFi Hotspots

They are everywhere these days. WiFi hotspots for checking e-mail and hopping on the Internet can be found in airports, coffee shops and even most fast-food joints. But have you ever wondered, just how safe is it to connect? With the proliferation of hackers, viruses and identity theft at an all-time high, you are smart to be concerned.

Cake, Presents & Embezzlement

There’s nothing like a birthday party complete with an over-the-top cake, mounds of balloons and presents stacked to the ceiling. No, we’re not talking about Miley Cyrus’ 23rd birthday extravaganza, we’re talking about the surprise birthday bash Ruth C. Amen threw for her boss, without approval.

TAKE YOUR PROFIT FIRST, ALWAYS

The formula for profitability has been established for ages. Every business owner, CEO, freelancer and entrepreneur knows it. It is required by Generally Accepted Accounting Principles (GAAP), which is enforced by the SEC in the US and the International Accounting Standards Board internationally.

Internet Vigilance

Despite constant development in security and stability, the Internet still remains very much a Wild West landscape. You can navigate through it, but you never know when you might encounter a hidden danger. Threats exist on a global scale.

Cybercriminals want information.

January 2015 E-mail TechTip

If your organization is currently running either Microsoft Windows Server 2003 or Exchange 2003 on any servers in your office, you need to know about a dangerous security threat to your organization that must be addressed very soon. Please take a moment to read this important announcement.

December 2014 E-mail TechTip

As you probably read, earlier this year over 100 celebrities (including Hunger Games star Jennifer Lawrence, swimsuit model Kate Upton and many more) recently had naked and explicit photos hacked from their iCloud accounts and published online. The hackers aggressively attempted to blackmail many others, threatening to post their pictures online.