Technology Made Simple
Thursday June 29th 2017

Insider

Archives

Posts Tagged ‘Cyber Security’

Q&A Monday: Security Question Safety?

Q&A Monday:  Security Question Safety?

Question: With all the talk about making a password secure, I noticed that someone with enough knowledge of me would be able to reset my password using the security questions. These questions are similar across almost every site that I visit and a friend or determined enough hacker could easily guess the answers, any idea on a way to help keep [...]

Computer Download Saftey

Computer Download Saftey

  Technology has made strives to make the internet as cross platform as possible, meaning regardless if it a Windows, Apple or Mobile device most sites work across all these platforms with minimal or no downloads.  Yet, we still can't get completely away from the downloads, whether it is games or specialized applications for watching videos or [...]

Simple Tips to a Secure Password

Simple Tips to a Secure Password

For many of us out there creating a secure password isn't always easy, it's hard to memorize one of those complex passwords (i.e. @<6v')T[~5).   I want to give you some good tips (and things to avoid) in order to make your password more secure.  The most common thing people do, and I was once guilty of that myself, is make the password for [...]

National Cyber Security Awareness Month (10th Year)

National Cyber Security Awareness Month (10th Year)

Hello Everyone, October marks the 10th Annual Cyber Security Awareness Month.  This month is set aside as an opportunity to engage both public and private sector companies and more importantly the general public to create a safe, secure, and resilient cyber environment. It's not just companies that should pay attention,  everyone has to play a [...]

Importance of Security Awareness

Importance of Security Awareness

Whether you know it or not, companies spends millions of dollars trying to make their network safe from hackers.  Billions of dollars and a lot of lost time are the cost that companies have to share when their systems are breached.  The problem becomes that most companies only address half of the solution, you can pour all the money you have [...]