Archive for May 2013

Spam, Spam, Go Away

used with permission from Norton by Symantec Spam. In some ways, it’s the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it’s also a pervasive problem that’s clogging and overwhelming the Internet’s email systems. Spam accounts for approximately 80 percent of worldwide email volume. In…

Read More

Think before sharing your location online

used with permission by HP Technology at Work Many online alerts and notifications signal your real-life movements to the outside world. Location-based apps are trusted tools for keeping clients, colleagues and friends updated on your whereabouts. However, before you “Check in” everywhere, all the time, it is important to think about who exactly can access…

Read More

Network Security Checklist

used with permission from Cisco Many small and medium-sized businesses do not have adequate network security. Here’s how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have…

Read More