Tech Insights

rss

Contributor Columns on Information Technology and Security

#1. Whenever possible, configure your Internet connection to always use HTTPS. This is the “https” that appears before the “www” in a Web address, and the https is preceded by a padlock icon. For Gmail, this works by clicking Settings in the top right; select the General tab, then hit ...

As part of IT Specialist's series of profiles on startups with new solutions or technology which we feel could be of interest to IT professionals, we are pleased to introduce Work Market.  Work Market has designed a platform specifically targeting serious IT professionals and enterprises and IT service companies needing to ...

As part of IT Specialist's series of profiles on innovative firms which we believe can assist IT managers better understand their job and industry, we are pleased to introduce BrightTALK. BrightTALK offers videos and webinars from businesses across a variety of sectors that help educate and inform communities of professionals. Joining ...

Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money is dirty, and the cards you hand to people with dirty ...

With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the ones who create all kinds of scams designed to do everything from getting us ...

Here’s a late night infomercial for you: How’s that burger flipping going? That cubicle working out? Anyway, I’m sure your boss is such a nice guy. Guess what! If you’re interested in a career in criminal hacking, you don’t even need a computer! This (scary) special, one-time offer comes ...

It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it up to developers and allowed the creation of applications that made the smartphone what it ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its