Before we get to "SIM Swapping", two Factor Authentication (or 2FA) is also a term that has been in the news recently. It is a way of securing your email, banking, and social media accounts by requiring you to authenticate using more than one factor to prove your...
Security Products and Services
What is a Password Safe?
Tired of having to pick a password that has at least 8 characters and at least one uppercase, lowercase, digit and special character (but not a / or -) and can't be any of your past passwords or contain your username, first or last name? Tired of writing all these...
Google Mail Helps Keep Your Business Safe
Most of us know about the "Spam folder"–the place where mail gremlins send messages that they think is garbage. Depending on your email system, this decision could be based on whether you've ever sent or received mail from that address before, or if it has too many...
Microsoft will no longer be providing support for Windows 7 and Windows Server 2008 as of January 14, 2020
This includes any security patches and updates, system patches, and technical support. If you or someone you know is still running Windows 7 (or heaven forbid, Windows XP) workstations in their office, They are at a huge risk of malware or a ransomware attack. Atlas...
The Tale of Two Christmases (or Why I Need to Eat my own Dog Food)
Christmas has become a time for personal IT trials. Just before a Christmas flight in 2017, my laptop's motherboard failed. Granted, it was a 5 year old machine and had given me a good life; but it was still frustrating. The bright spot was that I had "eaten my own...
Supporting Road Warriors
I acquired a new client yesterday. He owns a small business owner and is a frequent road warrior as he meets with customers. His list of frustrations from his last service provider was a long one: When he was away from Wifi, he needed to use his cell phone as a hot...
Baking Security into Software
Today, in the best case, most software implements security and privacy as just one of many competing requirements along with functionality and usability. In the worst case, security and privacy are an after-thought—designed and installed to satisfy minimal regulatory requirements, user expectations, or avoid negative software reviews. That will all change—at least for software used within the European Union or for software or systems which stores the data of EU companies and citizens—by May 2018.
Decision Making
I once finished a engagement with a company that had a difficult time with decision-making. When employees would ask how a mandated change should be implemented, the manager might respond with, "I'm not a technical guy; be creative," and then walk away. I remember...
Demographics vs. Shared Values
I've lost count of the number of articles that have come across my feed with titles like, "Reaching out to Millennials", "Understanding your target market", or "What Boomers need." Traditional marketing models are based on carving up the universe of all potential...