Blog

Careful! Phishing E-mails On The Rise

A phishing e-mail is an e-mail sent by a hacker designed to fool the recipient into downloading a virus, giving up their credit card number, personal information (like a social security number), or account or login information to a particular web site. Often these e-mails are well designed to look exactly like an official notification from the site they are trying to emulate.

The Woman On The Other End of the Phone Wept…

“The world is against me and I can’t take it anymore!” cried the distraught woman. She had just called a crisis hotline desperate for someone to help her. “Last week I was in a car accident, my house was broken into, and now my computer has crashed and erased all of my business files!” This woman was already having a bad week, but it was that stupid computer that finally made her snap.

Is Best Buy’s New Electronics “Buy Back” Program All It’s Cracked Up To Be?

Is Best Buy’s New Electronics “Buy Back” Program All It’s Cracked Up To Be?

You may have heard about the new “Buy Back” pro-gram being offered by Best Buy. The premise behind Best Buy’s Buy Back program is simple: Buy a technology product in certain categories – mobile phones (but not prepaid phones), laptops, netbooks, tablet computers and TVs – from Best Buy, and the store will let you bring it back and receive a portion of the purchase price. Of course, there are “catches.”

Can You Really Get Microsoft Office For Just $6 A Month?

Recently, Microsoft announced a real “game changer” for the IT industry and something that may mean the demise of the $62 billion-dollar company‟s stronghold on the desktop. What is it? Office 365, which is their new cloud computing answer to Google Apps. Instead of paying $300 per license, you can now access the entire Office suite of products via the Internet for $6 to $24 per month (like paying for a utility).

What Is “Cloud Computing?”

Cloud computing refers to the “next evolution” of the Internet and how users (you and me) access, store and work with applications, files, e-mail, data and more. Instead of having all your files and applications stored on a PC or laptop, cloud computing puts this workload onto a high-speed, high security server that you access via any Internet connection or device. Why do this? Several reasons

7 Simple Ways To Keep Your iPad Secure

7 Simple Ways To Keep Your iPad Secure

Don’t leave it lying around Although this is common sense, you’ve probably violated this rule more than once. iPads are easy targets for thieves, so don’t let it out of your sight when in a public place – and don’t leave it in plain view in your car or you might end up with a bro-ken window in addition to a stolen iPad.

Two Key Lessons

First, you need to be a lot more wary of e-mail promotions and communications that ask you to provide your credit card infor-mation or to validate your account information (username, pass-word, social security number, etc.). No valid company will ever ask you to send important, confidential information in that manner.