IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology

Fotolia_126934547_XS.jpg

We’re told to sell the sizzle, not the sausage. That kind of advice tends to grate on us tech folk, because we already find the whole idea of selling a little bit uncomfortable. Selling the sizzle seems to justify our scepticism. But we do need to sell, and so what ...

Fotolia_65570619_XS.jpg

Even if you have the best security on your computer network, you might have noticed that you still seem to get hacked…or worse. Ask Equifax. Why is this happening? It’s probably because a member of your staff has made it easy for cyber criminals to get inside. It’s really ...

  All of us have cell phones these days, and if you are like the vast majority of the population, you access everything from social media to banking information right from your mobile phone. However, if you do this, which everyone does, you are putting yourself in the position to ...

Specify Alternate Text

A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand market had personal information left on them. These include tablets, mobile phones, and hard drives. The market for second hand ...

Specify Alternate Text

If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the same thing for your phone? From 2015 to 2016 malware infections on smartphones swelled by 96%, and about 71% of ...

Specify Alternate Text

Hi, I wanted to share with you a funny story….  My boss calls me into her office, very serious like.  She sits me down and asks “Did you use the company credit card without authorization?” I am very confused, although I have access, I would not order anything without asking.  I ...

Specify Alternate Text

If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options. Criptext This is a browser plug-in that works for Chrome and Safari. Your message including attachments ...

Specify Alternate Text

If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems. In fact, out of the top 25 most popular apps, 18 of them ...

Specify Alternate Text

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about ...

Specify Alternate Text

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people: Think before ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.