May 5, 2012
computer-security cincinnati

The SMB security gap in network security

A new study from Symantec finds that while small and midsize businesses are acutely aware of today’s security risks, a […]
June 14, 2012

LoJack for Laptops

Laptops and tablet thefts are on the rise.  They are high value, easy to steal, and hard to find objects. […]
December 8, 2013
email hack

How to make great passwords part II

From Neal O’Farrell at the Identity Theft Council. He suggest creating a use a passphrase. A passphrase is a short […]
March 7, 2014

Do I have XP?

This is the number one question we received this week. If you are unsure you can check here; which-operating-system Microsoft […]
August 31, 2014

Forward email as attachment

To trace an email problem, the most important information is contained in the mail headers. These are little pieces of […]
November 21, 2014

My Clean PC deceptive practices

SEATTLE – A software company whose self-proclaimed “performance-enhancing and PC maintenance” programs were purchased by more than 19,000 Washington residents […]