Following up on Predictions for 2018 in Tech

On New Years Eve, 2017, we wrote an article with predictions for the 2018 year in tech.  Now that the Halloween has passed and we are in the midst of the end of the year Holiday season, now's a good time as any to reflect on those predictions, and see what we got right, and … Continue reading Following up on Predictions for 2018 in Tech

The First Recorded Cyberattack

Twins Francois & Joseph Blanc were men ahead of their time. They are quite possible the first people to hack technology in order to commit insider trading, and they got away with it! We’re talking about two guys who hacked the top-of-the-line highest tech communication networks in the world at the time they hacked it: Napolean’s … Continue reading The First Recorded Cyberattack

Tech Tip: How to Create a Restore Point in Windows

Using backups to create restore points are a great method to unwind damage caused by a virus or hack. They also help restore accidentally deleted information. Here's how to create a backup restore point on your device: Creating a backup: 1.) Go to Control Panel > System and Maintenance > Backup and Restore 2.) Select Setup … Continue reading Tech Tip: How to Create a Restore Point in Windows

How to Reduce Instances of Spam

We all receive spam emails at one point or another. They are an obnoxious fact of owning an email address, and they don't always get picked up by a spam filter. If you are being inundated with spam emails, here's some tricks you can use to reduce and prevent future spam emails. 1.) Be careful … Continue reading How to Reduce Instances of Spam

Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering

Protecting Your Security on Social Media and Social Networks

One of the most vulnerable nodes in the average user's technological presence is on social media. With hundreds of millions of users on many different popular social media and networking platforms, these platforms prove fertile ground for spammers, scammers and cyber-criminals. Don't be a target, use these tips to protect yourself when interacting on social … Continue reading Protecting Your Security on Social Media and Social Networks

Tech Tip: Fixing the Telugu Character Bug on iOS 11

While Apple's iPhone is the symbol of our current generations technological achievements, the iOS 11 operating system has probably been the buggiest OS of our generation. While Apple has been pretty responsive to the bugs that have been popping up in iOS 11, with their Patch Tuesday updates, each patch seems to be creating as … Continue reading Tech Tip: Fixing the Telugu Character Bug on iOS 11

Benefits of Two-Factor Authentication

It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication

What Not to Post On Social Media

Many of the tips this blog provides are active measures to protect yourself from cyber security threats. However, sometimes less is more. You can be super secure with your security setup, then blow it all away by oversharing on social media. Here's a list of items you should avoid posting on social media sites like … Continue reading What Not to Post On Social Media

Tech Tip: Traveling Securely

Part 1: Cyber Security Millions of people travel through airports and airlines for business or personal reasons every day, and most of them will carry a laptop, smart phone or some other device during their travels. When you and your devices are in motion, particularly while going across international borders, you and your devices are … Continue reading Tech Tip: Traveling Securely