(405) 919-9901

Time to ditch Yahoo for good

If you bought a car, and it broke down and exploded, would you buy the same make and model, again? Well, OK, so maybe you would. Maybe you would think its problems were just a fluke, and surely couldn’t happen, again. But if your second same-make-and-model car...

Computer bathtime, part 3: hardware and software security

Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...

Computer bathtime, part 2: critical security controls

Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...

Computer bathtime: foundational cyber hygiene

“Critical Security Controls,” a phrase coined by the Center for Internet Security (CIS), is a high-tech, nerdy way of saying, “super-important things you really, really, really, really need to do.” They’re not kidding around, either; you really do need to do them. The...

Facebook safety awareness

I am often asked, “Is Facebook safe?” Facebook, the most popular social networking website in the world, claims almost 30 percent of the world’s population as members. Just like the world’s population, it can be both safe and dangerous at the...