One thing you can count on with computers (which includes smartphones, tablets and iPads) is that things will always change; they will never stay the same for very long. With computers, there will always be something to add, update, upgrade or replace. Monthly...
If you bought a car, and it broke down and exploded, would you buy the same make and model, again? Well, OK, so maybe you would. Maybe you would think its problems were just a fluke, and surely couldn’t happen, again. But if your second same-make-and-model car...
Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...
Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...