(405) 919-9901

Time to ditch Yahoo for good

If you bought a car, and it broke down and exploded, would you buy the same make and model, again? Well, OK, so maybe you would. Maybe you would think its problems were just a fluke, and surely couldn’t happen, again. But if your second same-make-and-model car...

Computer bathtime, part 3: hardware and software security

Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...

Computer bathtime, part 2: critical security controls

Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...