Archive for the ‘Security’ Category
If you’ve enjoyed reading my posts this year, you may want to join me in looking back at my top five most-read posts in 2012. Enjoy! I hope each of you has a very prosperous New Year. Here they are in order of popularity: Clear Your Google Search History Before the Guard Rails Come Down… more »
I deleted my Pinterest account a couple weeks ago, for two reasons: I wasn’t using it. While I like the stunning photography, design, type face, and architecture images that the pin board delivers beautifully, I can get them just as easily on my Zite account, and I can still see them any time on Pinterest…without… more »
Last week’s headlines were pretty scary. If you have a LinkedIn account, I’m sure your ears perked up when you heard the news: A Russian hacker stole nearly 6.5 million encrypted LinkedIn account passwords. Just to prove his point, he published those passwords online. I didn’t take a chance. I changed my LinkedIn password last… more »
Cisco just released survey results from its IBSG Horizon Study on BYOD (Bring Your Own Device). Until I read it I didn’t know that using my personally-owned device, either in the office or away, to access my employer’s resources (email, data, file servers, etc.) had earned its own acronym. But it has. With or without… more »
By now you know that according to the Mayan calendar, the world as we know it will come to an end later this year; December 21, 2012 to be exact. With only 250 days left, you’d sure hate to be unable to surf the ‘net most of that time. So please pay attention to this… more »
When do you want the value of your smartphone to plummet? Immediately after it’s been stolen! That’s the premise of the new database just announced by the FCC this week. For now, it’s an idea. A plan. And all four major U.S. cellular service providers have agreed to participate. Once the database is in place… more »
JMichael offers a quick reference of things you can do to keep your information, your money and your identity safe.