(405) 919-9901

Protect your tablet computers and smart phones

Smart phones and tablet computers are increasingly becoming the prime ways people connect to the Internet. They have also become prime targets in the sights of the Internet bad guys, who aim to steal, cheat, trick and destroy, just like they have for years against the...

Time to ditch Yahoo for good

If you bought a car, and it broke down and exploded, would you buy the same make and model, again? Well, OK, so maybe you would. Maybe you would think its problems were just a fluke, and surely couldn’t happen, again. But if your second same-make-and-model car...

Computer bathtime, part 3: hardware and software security

Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...

Computer bathtime, part 2: critical security controls

Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...