Mobile device encryption defined

Mobile device encryption defined

As the line between work and life continues to blend, two devices are standing out as major change agents. Those devices are the smartphone and to a lesser, but growing, extent the tablet. It’s common to see someone on their ‘day off’ checking their...

Who knows your important passwords?

When it comes to disasters, people and businesses tend to think big, really big. Take for example Superstorm Sandy that hit the eastern US earlier in November. It can be pretty much guaranteed that a whole string of businesses will be preparing diligently for the next...

How to identify different kinds of spam

Spam was introduced in the late 1930s as a tinned form of ham that was easy to eat. It quickly became ubiquitous, so much so, that in 1970 Monty Python created a skit about a couple who go to a diner where Spam is in nearly every dish. Throughout the comedy sketch,...

Want to customize Windows 8?

Windows 8 is out, and with it comes a prettied up User Interface (UI) that is geared towards tablet and touchscreen device users. One thing that is de rigueur for all operating systems is the ability to customize it to meet your needs and preferences. As Windows 8 is...

How to use Pinterest to boost marketing

Social networks are something that have become a major marketing tool for all companies. A maintained presence on the major networks will help establish/solidify your brand, and possibly drive traffic and interest to your website. One of the newest social media...