CrowdStrike Outage Punctuates Vendor Fatigue

An exhausted customer vendor service rep snoozing on her computer with her hand still clutched to her coffee

CrowdStrike Outage Punctuates Vendor Fatigue Outsourcing Gaps Show IT Weaknesses Even before CrowdStrike disbaled Windows computers worldwide, companies of all sizes were feeling vendor fatigue. Many companies who were wooed to Cloud-based, off-site support for IT services were already exploring either in-house or local alternatives. Besides delays and communication issues, customers found far too many […]

10 Tips To Get Cloud Ready

A beautiful young blonde woman sheltering under a torn and tattered yellow umbrella looks up miserably as she waits for a thunderstorm cloud to pass.

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]

10 Privacy Tips Everyone Should Know

Girl trying to keep her internet data confidential typing password in secret

10 Privacy Tips Everyone Should Know Finding and Removing Open Source Intelligence Mark Zuckerberg testified before Congress that privacy is dead. Failures by businesses, industries, and our own governments punctuate the reality. One of the best sources of information hackers, scammers, and pesky sales people use to find and harass you is called Open Source […]

What is a Firewall?

firewall boy in thought

What is a Firewall? The Internet’s Most Misunderstood Protection No security professional, IT guru, or shade tree PC tech will ever tell you to connect directly to the Internet unprotected. If you ask anyone, they will all say you need a firewall to protect your data and all the devices in your home or office. […]

10 (Mostly) Free Ways To Stop Robocalls and Spam

Angry woman customer claiming on the phone

10 (Mostly) Free Ways to Stop Robocalls and Spam How To Protect Yourself In Email and On the Phone The scams, hacks, and breaches that cost the average person and business the most money come through two of the most commonly used forms of communication. The first, you can probably guess, is email. Spam and […]

10 Tips Seniors Need To Avoid Scams

seniors

10 Tips Seniors Need To Avoid Scams Protect Yourself Online and In Real Life You’ve seen it all. The rise and fall of global superpowers. A dozen presidents. Technology the likes of which would have gotten your grandparents burned at the stake. OK, well maybe not the last one but things have definitely changed over […]

10 Teen Tips for Cyber Safety

teen

10 Teen Tips for Cyber Safety Keeping Them Safe Online and IRL (In Real Life) You are special! The Under 18 crowd is one of the most targeted groups on the Internet. Teens and Tweens (8-12 year olds) are not just under constant bombardment from advertisers, but also hackers. We call them cyber criminals, threat […]

The Time of Your (IT) Life

time

The Time of Your (IT) Life Synchronizing Your Logs For Fun and Profit Time. The common enemy of all humans. It is unstoppable, uncontrollable, unforgiving, and unbelievably necessary to keep your IT systems functioning. No police box or DeLorean required. What time is it? Computer systems see time differently than we humans. Yes, they can […]

Make The Internet Fast Again

internet

Make The Internet Fast Again! OR…12 Tips To Speed Up Your Internet Why is the Internet so slow? We pay for 100 Megs, right? Why is my maximum download speed under 10? I just want to download one picture of the grandkids. Why does it take so long? Sound familiar? Several things can cause slow […]

Hacker Series – Playing Hard To Get

hacker

Hacker Series – Playing Hard To Get OR…5 Ways To Stop Hackers In Their Tracks I am a hacker. After scouring one million IP addresses in the United States, I compiled a list of plump targets ripe for exploitation. (If you missed part 1, click here). While I wait for the rest of my scans […]