jump to navigation

Web Surfing Monitors & Controls for Businesses September 20, 2018

Posted by twiznc in Security, Services & Software Recommendations, Tips & Tricks.
add a comment

Updated 9/20/2018

Monitoring and, in some cases, filtering and/or blocking, websites accessible to employees can not only improve productivity but also protect a business from the legal dangers of “hostile work environment” lawsuits. (more…)

Advertisements

Storm Preparedness for your Technology September 12, 2018

Posted by twiznc in Security.
Tags:
add a comment

With the approach of a hurricane, ice or severe snow storm or other natural diaster, you should take appropriate steps to be sure your home and/or business technology is protected from power surges, water damage, or other physical damage caused by the wind, rain, and other potential storm damage.  Below are some basic guidelines from Tech Wizards for protecting your data, computers, printers, and other network devices.  As you know, hurricanes and large storms can be unpredictable and can unexpectedly change their path without warning, so it is best to be prepared for the worst and hope for the best. (more…)

Secure Password Guide August 15, 2016

Posted by twiznc in Security.
add a comment

At a minimum, Tech Wizards strongly urge you to utilize passphrases of at least 16 characters and change passwords at least every 3-6 months. The below information can make creating relatively easy-to-remember passphrases and changing them regularly fairly easy. At a minimum, create a passphrase of at least 16 letters such as lyrics from a song (allyouneedislove), a line from a nursery rhyme (hey diddle diddle), a line from a poem (andmilestogobeforeisleep), etc. Capitalizing one or more letters and adding special characters (even spaces) will improve the strength of any passphrase. There are also several free online tools that can generate long, secure passwords for you (see links below). Although it is preferable to come up with an entirely new password every time you change your password, adding the month and year as a four-digit addition at the end of your phrase (Allyouneedislove!0316) takes some of the pain out of changing your password (just update the month and year code at the end of your passphrase); if you do this every calendar quarter then the number becomes very easy to remember.

(more…)

Email Encryption Solutions March 7, 2016

Posted by twiznc in Email, Security, Services & Software Recommendations.
add a comment

Updated 07/17/2017

Email encryption can be very confusing and difficult to sort out.  Basically, there is “endpoint-to-server” encryption (which is what Gmail does) and there is “endpoint-to-endpoint” encryption (where messages are encrypted from the sender’s inbox to the recipient’s inbox).  Regulatory compliance requires “true” endpoint-to-endpoint encryption, which is only available from third parties that provide such a service, usually via a “hosted” encryption mail server. (more…)

Data Backup Solutions May 9, 2009

Posted by twiznc in Security, Services & Software Recommendations.
add a comment

Updated May 10 6, 2017

Data backup is critical for both businesses and home users.  Unless you would be okay with your computer disappearing from the face of the earth as you read this sentence (never to return), and not miss anything stored on its’ hard drive, then you need to have a backup solution in place and backing up your data on a regular basis.  This article covers the importance of backing up critical/valuable data on your hard drive, discusses both “on-site” and online backup options, and recommends some good backup solutions (some of which are FREE).

(more…)

Web Surfing Monitors & Controls for Parents May 4, 2009

Posted by twiznc in Security, Services & Software Recommendations.
add a comment

Updated Sept 20, 2018

Web browsing monitors and controls allow parents to monitor their children’s web browsing activity, filter and block inappropriate web sites, or limit when the Internet can be browsed.  In this article we describe and provide links to several recommended monitoring and control programs.  We invite any suggestions of programs to include in these listings. (more…)

Four Solid Methods for Getting Back Your Lost Thumb Drive March 24, 2009

Posted by twiznc in Security.
add a comment

Updated March 6, 2016

USB thumb drives are extremely handy. However, being so small it is also easy to accidently leave it in a computer that is not your own, especially if the only USB ports on the computer are in the back of the computer.

LifeHacker.com offers four nice ideas for getting your lost USB drive back.  Click here to view the article.

Track Your Lost/Stolen Computer’s Whereabouts (or erase all data from it remotely) March 21, 2009

Posted by twiznc in Security.
add a comment

Updated March 6, 2016

What if your laptop or netbook computer physically disappeared overnight?  What would you do? What would happen to your data? How much business would you loose? Could someone steal your identity?  All kinds of bad things can happen if your laptop, netbook, or even your desktop PC was lost or stolen.  Good news!  There are tools that can at best get your computer back, or at least allow you to remotely delete all of the data on the hard drive.  Here are two tools that can help (one is FREE!).

(more…)