
IT Security Tip #16: A WARNING if you handle, process or store client credit cards
Quick Tip: Handle credit card data with utmost security… or else! Why? If you handle, process or store credit cards in any manner, you are

Quick Tip: Handle credit card data with utmost security… or else! Why? If you handle, process or store credit cards in any manner, you are

The .dot file extension (DOcument Template) is used by Microsoft Word to store document templates. A template is a document type that creates a copy

Quick Tip: Avoid an “open door policy” with your firewall. Why? A firewall is a device that acts like a security cop watching over your

Big Data is generally defined as data that has a very high volume, lots of variety, is from a trusted source (veracity), changes rapidly (velocity)

Windows, Mac OS, Android, Linux, laptops, tablets, phones and the list goes on. With all of the various computers, devices and operating systems in use

Quick Tip: Close your entire browser, not just the pop up. Why? You’re working at your computer when all of the sudden – BAM! –

Noted French anthropologist Claude Levi Strauss said, “The wise man doesn’t give the right answers, he poses the right questions.” Navigating the terrain in the

Quick Tip: Uninstall Apple’s QuickTime media player from all your Windows machines. Why? Maybe you have an iPad or iPhone that you sync or back

Quick Tip: Confirm it’s a legitimate WiFi network before you connect. Why: We’re all guilty of it: connecting to free public WiFi. Whether it’s at

Business identity theft is serious business! Steve Cox, from the Better Business Bureau, stresses that “Business identity theft is a very real concern in today’s
"*" indicates required fields