Make Your Web Site Googlicious

For the next two weeks I will be teaching a course designed to help small business owners improve their page rank and traffic on their web site.

So you own or manage a web site, but nothing’s happening. How can you improve your results in the major search engines, increase your page rank, and drive traffic to your web site that results in more business? In this class you will learn about online strategies you can do yourself for free that ...

Continue Reading →
0

PYDA–Internet Security

Everyone needs to be protected from Internet-borne threats and exploits. The two most common attack vectors are emails with malicious links, or web sites with malicious embedded downloads. In many cases the email link takes you to a cleverly crafted look-alike web page, but there are plenty of examples of well-known and well trafficked legitimate web sites that have been hacked and for a time were hosting malicious downloads unaware.

The first rule of email security is NEVER click on ...

Continue Reading →
0

PYDA–Physical Security

This is the first part of the Protecting “Your Digital Assets” series of articles.  Today we are focusing on the simplest and most overlooked part of computer security, the physical security of the device itself.  If your computer or smartphone is stolen, well, it can be game over for your personal information.

Back when I was in computer school, we were admonished to “start at the physical level” when troubleshooting a computer problem. You know – is it plugged in, is ...

Continue Reading →
0

Protecting Your Digital Assets

I was asked to write a guest blog for the Secure 360 organization, and it ended up be published in two sections on their blog.  When I was writing it I realized that I could have written much more on this subject.  And so I have, and I will be release the six major parts in a series of blog articles over the next week or so.

Why?  Because many computer criminals are targeting small and medium size businesses because they ...

Continue Reading →
0

Facebook, LinkedIn and Google+ for Business

We are back in the class room, and our first offering through area Community education Programs is Facebook, LinkedIn and Google+ for Business.  If you are interested in learning how to leverage social media and social networking sites to grow your business and attract new customers, this class is for you.

This course takes a look at the new web trends in social networking such as Facebook, LinkedIn, and Google +, with a Look at Twitter. Students will learn about the ...

Continue Reading →
0

Recovering Deleted Data on a Hard Drive

We recently started working with a data recovery company to augment the data recovery services that we already offer.  They sent us an email with come great tips that we wanted to share with our reader and clients.  Here they are:

  1. When you delete files from a hard drive, the information is not actually deleted, it is just removed from the file directory.  The space on the hard drive is marked as “available”, but the data lives on until it is ...
Continue Reading →
0

SMBs in Cyber-Crime Crosshairs

SMBs (Small and Medium Sized Businesses) are in the unenviable position of becoming the major target of cyber crime groups.  Why is this?  There are a couple factors in play that may make your company more susceptible to this emerging threat.

First, the SMB probably has more money in their bank checking and savings accounts than a typical consumer target would have, meaning that for roughly the same amount of effort, an exploit against an SMB will yield many times more ...

Continue Reading →
0

Chinese Telecom Manufacturers Are A Security Threat?

At the beginning of October the House of Representatives Intelligence Committee released a report that accused Chinese telecom manufacturers Huawei Technologies and ZTE of being a potential security threat to computer networks and the Internet in the United States and worldwide.  There are concerns about the companies’ close ties to the Chinese government and the Chinese Communist Party.  The concern is that using the switches, routers, and other telecom gear manufactured by these companies could compromise network security, through software ...

Continue Reading →
0

7 Secrets of Windows 7 (&8)

Starting on Thursday of this week, and then resuming on November 19, I will be offering a class that takes a look at the Windows 7 and the new Windows 8 operating systems, to give newer users of either operating system a look at some of the special features each has to offer.

7 Secrets of Windows 7 (&8)

Windows 7 is the latest Microsoft operating system, and the replacement for Windows Vista and Windows XP. In this class, we will look ...

Continue Reading →
0

The Bulletproof Computer

For the next two weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated with your Internet connection. ...

Continue Reading →
0
Page 70 of 101 «...4050606869707172...»