Tech(know)logy Bookmark The Legitimate Websites You Frequently Visit Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one.…
Tech(know)logy How To Foil Ransomware Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least…
Tech(know)logy Not All Backups Are Created Equal – What Questions To Ask Backup & Disaster Recovery Checklist The ONLY way to completely protect your data and guarantee that you could restore it all after a major disaster is…
Tech(know)logy If This Type Of Alert Pops Up, Don’t Click On It! You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus…
Tech(know)logy Use Strong Passwords! Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess…