I know it is fun to watch piano playing kittens online… but this is about keeping your website hack-resistant, ensuring client data is safe, and fighting zombies and site infesting viruses. Let’s talk website security.

I know it is fun to watch piano playing kittens online… but this is about keeping your website hack-resistant, ensuring client data is safe, and fighting zombies and site infesting viruses. Let’s talk website security.
We often get very busy preparing an escape route in times of impending disaster. I’ve been through several hurricanes, and can expect power outages for several days, and the likelihood of water damage. So here are 6 Tips to Hurricane Prep your Technology!
The phone rings at 9 a.m. (sometimes 9 p.m.) from a local area code, and as you down your second cup of coffee you quickly answer. You hear: "Hello, My name is Amanda and I am calling about your student loans. We can help you consolidate ..." or ...
Travel is stressful enough, but now, safeguarding our devices and data should be part of our packing list. In fact, it should be a habit, not an afterthought. Here are 3 things I implemented before leaving for an international trip to better safeguard my devices.
Surfing the web is looking more like a Hawaiian breaker with killer coral reefs than the tender rolling waves ready for playful body surfing. All those glorious little temptations on websites, like glimmering colorful fish, are what are called “click-bait.” Click, and you are hooked!
Your iPhone tell you that you are out of space? There’s a hidden place that holds your items deleted photos. Here are the steps to permanently clear your iPhone of those undesirable and random photos and make room for your next viral hit!
I know it is Girl Scout Cookie Season, but in this case, I am really talking about clearing out some of the spaces on your computer that are likely hoarding cookies, slowing down your system, your browsing experiences, and maybe even causing your next travel ticket to jump up in price when you wait more than 5 minutes to make a decision!
You may have been offered by your email service provider, your bank, your investment firm, or other online accounts, to set up what is referred to as 2-Step Authentication, 2-Step Verification, or Multi-Factor Authentication (MFA). What is it and why?
When I was teaching college, I always did a resume building workshop, and one of my examples of what NOT to do was a parody on a the worst resume imaginable. In it, the author used L33t Sp34k (Leet Speak) to indicate some level of tech savvy.
I am finding that more of my clients are bumping into malware that hijacks their system in ways that keeps them from handling the everyday tasks they enjoy. What causes us to fall into these vulnerabilities? What exactly is happening?