May 5, 2012
computer-security cincinnati

The SMB security gap in network security

A new study from Symantec finds that while small and midsize businesses are acutely aware of today’s security risks, a […]
June 14, 2012

LoJack for Laptops

Laptops and tablet thefts are on the rise.  They are high value, easy to steal, and hard to find objects. […]
December 8, 2013
email hack

How to make great passwords part II

From Neal O’Farrell at the Identity Theft Council. He suggest creating a use a passphrase. A passphrase is a short […]
December 5, 2015

What to do if your computer becomes infected

You can’t turn your computer on or off. It’s acting up, running slow, opening pages you didn’t click, displaying pop-ups […]
December 5, 2015

Next steps if email has been hacked

Your friends and family are getting e-mails from you that you didn’t send. Or maybe you want to check your […]
December 5, 2015

Protect your computer from malware

Would it surprise you to learn that millions of computers in the US are infected with malware? That’s a lot […]