The Next Big Thing?
There is a lot of talk today about systems getting smaller, thinner and lighter. Tablets have become the norm for consuming content. Customers like them because they can go anywhere, they have long...
View ArticlePatching the End User: How to Recognize the Social Engineering In Scams
Scammers use psychological manipulation to defraud their victims, so it is extremely useful to be able to identify the social engineering elements in online scams. If you can recognize the social...
View ArticleCryptolocker: How to avoid getting infected and what to do if you are
There’s a big threat wiling around on the Internet right now: A particularly nasty piece of ransomware called Cryptolocker. Many, many organizations are being infected with this malware, but...
View ArticleThe Heartbleed SSL Bug
Just days ago one of the largest Internet security flaws in recent history was discovered: the Heartbleed bug. While you’ve probably heard on the news about this bug, this cartoon is probably the...
View ArticleAn Introduction to Net Neutrality: What It Is, What It Means for You, and...
Net Neutrality. You may have heard about it on the news. You may not entirely understand what it’s all about. Here’s a primer on what net neutrality is, how it might affect you, and what you can do...
View Article