The Significance of the Samsung Note

Like much in the history of human affairs, technical advancement does not generally happen in smooth progression. It moves in fits and starts, and smart-phone technology has been on a tear for the last few years. Palm was the first true smart-phone with a library of independent apps, but it was the iPhone that first…

Read more

Local Server or Cloud?

Local Server or Cloud? There is a lot of talk lately about “cloud computing” and moving “Line of Business” applications to the cloud. Simply put this means using a web browser to access your applications hosted on a server somewhere on the Internet. There are several advantages for using cloud computing and many disadvantages. The…

Read more

Creating Passwords Using Seed Mapping

Rod Coleman Passwords are a pain. Security requirements are becoming more complex just as we need more passwords for new apps, challenging our ability to remember them all. Here are the requirements for a reasonably secure password: 1. Contain at least 8 characters. 2. Contain upper case letters. 3. Contain lower case letters. 4. Contain…

Read more

Zero Access Infection

Recently I encountered a threat that infected a client’s computer.    The Client noticed that their Antivirus Program intervened and requested a reboot of the computer to finish the remediation.   Upon Rebooting the user was unable to log on.   Worse yet she had no mouse or keyboard.    Fearing the worst the user pushed the power button…

Read more

Big Brother or Big Sister? – Improving Employee Productivity

Improving employee productivity The internet can be a big employee time waster.  About once or twice a month I get a call from a business owner asking how they can either monitor their employee’s computer usage or prevent them from wasting time on various web sites.  Monitoring and content filtering software are available to do…

Read more

A False Sense of Flight Security

The last 50 years has seen the emergence of passwords (or pass-numbers) to protect access to everything from your front door to your computer.  Cyberlore is has many examples of how poorly we apply this technology, and much of it’s true.  There are so many ways these security systems can fail, many of which are…

Read more