You Need Two-Step Authentication

  • tArA23YRqVk2ThyC
  • October 16th, 2012

It’s as simple as this: if you don’t know what two-step authentication is then you are at risk. Two-step authentication is a method of granting a user access using two or more ‘authentication factors’.  An authentication factor can be as simple as a password.  Using a single authentication factor (a single text password) has become […]

Read More

 

Spear-phishing – Read E-mail With Care

  • tArA23YRqVk2ThyC
  • April 7th, 2011

Epsilon, a company entrusted with large amounts of personal information on customers for all sorts of businesses was recently forced to notify large numbers of customers of a potential data breach. Best Buy, Marriott International and Scottrade are just a few of the big names who relied on Epsilon to store e-mail addresses, personal names, […]

Read More

 

Used Computers – Caveat Emptor

  • tArA23YRqVk2ThyC
  • October 20th, 2010

The desire to cut costs has lead a lot of businesses and individuals to consider used computers to replace previously failed PCs or act as basic data entry PCs as they expand. While this choice can yield positive results, it’s important that consumers understand the pros and cons of used PC equipment and understand alternatives […]

Read More