Random carousel of articles
Vishing-don’t be a victim
Business & Technology Planning
“Break glass” emergency privileged access
WordPress 2019 Featured Image shading
Where to find “free use licensed” photos and videos
Credential theft
The first rule of security: “Be aware”
WordPress Post Revisions
Prevent content filtering from affecting your web site
WordPress Plugins – 2.1 Mail Relay
Let me ask an honest question. Would you rather be doing business with “bobrx153@hotmail.com” or…
Link checkers
WordPress Plugins (1.0 Introduction)
WordPress is an incredible Content Management System — and it is free! WordPress off the…
Help I’ve fallen and my identity has been stolen!
Business Continuity Planning
Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business…
Restricting outbound firewall rules in operational environments
HostMantis WordPress web hosting review
Phish for phun and profit
Phishing is a real problem, and that problem is only increasing in frequency. Phish attacks…
Identity theft
Payment card theft
Inmotion Hosting review
Computer security hardening – safeguarding your systems
Putting your computer in chains is one way of hardening the system Computer Security. Kind…
LinkedIn – Writing the “right page” right!
Using Artificial Intelligence to create predictive systems
The term Artificial Intelligence (or AI) was coined in the mid 1950s. AI technology was…
WordPress: WordPress Subdirectory management
WordPress Plugins – 2.1 Interact with your users – Mailjet Outbound mail relay
Exploiting the SDLC
Free fax – free internet faxing
Free domain names
Coronavirus special report: Separating your Work and Personal identities
WordPress host hardening: password protect wp-login
Privacy at the workplace
Domain search – how to avoid front runners
Link tracking – who clicked my link?
Risk management – developing a framework
Risk management is an essential skill for any business professional. Whether it be having a…
Future of malware – December 2022
“The future of malware” is a trigger for most of us in computer security. Most…
Centrally managing WordPress sites
Managing multiple WordPress sites is no easy task. While managing a single WordPress site in…
Exploring advantages and disadvantages of Cloud: IAAS PAAS SAAS
The end of the (land) line
So you’ve looked at your local phone bill and it was… oh my, I’m paying…
Video creators and editors (and Image!)
Zero day, 0day, ohday, oh my!
Hackers have a few things in their favor when it comes to getting into your…
WordPress Plugins (2.0 Security: Confidentiality, Integrity, Availability)
This post is a part of the WordPress Plugins discussion threads and focuses on Plugins…