Categories
Computer security Technology & business

Configuring firewall rules in operational environments

Reconfiguring firewalls in operational environments are rife with concerns. This article helps to develop a plan for implementing change.

Categories
Technology & business

LinkedIn – Writing the “right page” right!

Getting started in LinkedIn is intimidating. That’s okay! This article is going to help you persuasively approach LinkedIn.

Categories
Computer security Technology & business

Domain search – how to avoid front runners

Have you every had that perfect domain name, searched online, found it was available… only to have it taken away in the couple of days it took you to decide to buy? Then this article is for you!

Categories
Computer security Technology & business

Coronavirus special report: Separating your Work and Personal identities

Whether working from home or working in an office, separating your “Work Identity” and “Personal Identity” remains very important, both for your protection and for the security of your company. Read this article for more information.

Categories
Technology & business

Inmotion Hosting review

This article presents a candid review of inmotion hosting, focused on both “reseller” and “end user” accounts: Ease of use, setup, speed, and configuration.

Categories
Computer security Technology & business

Credential theft

This presentation will help you understand the risks, recognize when you have been compromised, and avoid credential theft

Categories
Payment cards Technology & business

Payment card theft

Seems every day there are new reports of payment and credit card theft. Explore how payment card theft happens, and how to protect yourself.

Categories
Technology & business

Free domain names

Ready to show off a new domain? Want to use a “personalized” domain for a new customer, but don’t wish to buy the domain until the customer actually engages you with a contract? Sometimes having a free domain is of benefit.

Categories
Computer security Technology & business

Computer Security Incident Response (NIST SP800-61r2)

The NIST Computer Security Incident Handling Guide provides a framework for creating a company focused computer security incident response plan.

Categories
Computer security Technology & business

Help I’ve fallen and my identity has been stolen!

This short article will explore what you can do if your information is compromised, and give you advice even if it hasn’t (yet).

Categories
Technology & business WordPress

WordPress Plugins – 2.1 Mail Relay

Let me ask an honest question.  Would you rather be doing business with “bobrx153@hotmail.com” or “bob@randolf.com” ?  Which one looks more professional?  Which one looks more trustworthy?

Categories
Technology & business

Using Artificial Intelligence to create predictive systems

The term Artificial Intelligence (or AI) was coined in the mid 1950s.  AI technology was heavily funded by the Department of Defense for many years. Unfortunately, the practitioners at the time were overly optimistic and failed to overcome some of the difficulties that they faced. By the mid 1970s, funding was largely cut in favor […]

Categories
Technology & business

Business & Technology Planning

This article explores basic ideas that you should keep in mind as you are starting or continuing your business. It is intended to provoke deeper thoughts for you and your executive team. From business continuity, to free coffee and free WiFi, we’ll look into ideas that are important to businesses… and to customers.

Categories
Technology & business

Exploring advantages and disadvantages of Cloud: IAAS PAAS SAAS

Cloud early, cloud often: Four words to say that now is the time to embrace cloud services. Read more to understand and explore the advantages and disadvantages of “cloud” solutions.

Categories
Computer security Technology & business

Prevent content filtering from affecting your web site

Content filters categorize domains based on reputation. Many companies block domains based on those filters. This article will show you how to register your domains so that they are not inadvertently blocked.

Categories
Computer security Payment cards Technology & business

Identity theft

Our online identity IS our identity. Someone masquerading as you is potentially a dangerous situation, but it is at least creepy. The problem is, as sure as everyone will pay taxes this year, we will all have our online identity compromised.

What do you tell your colleagues who have had their identity stolen? What do you tell your family who have not *yet* had their identity stolen? What should they do? And what should they have done in order to reduce the vulnerability?

This paper will give you ideas on preventing problems in online identity theft, and also provide guidance on how to fix a problem if it happens.

Categories
Technology & business

Video creators and editors

Are you searching for a video editor? If so, this page is for you! OpenShot Video Editor, Kdenlive, YouTube Video Maker…

Categories
Technology & business

The end of the (land) line

So you’ve looked at your local phone bill and it was… oh my, I’m paying that much for a simple landline phone number? This doesn’t seem right! How can I be paying $40 a month for a landline phone (base price around $15/month, plus “options” price like call waiting around $20/month, plus taxes around 22%, […]

Categories
Technology & business

Business Continuity Planning

Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business continues to operate even during adverse situations. BCP is the work put in before those imperfect days, in order to smoothly transition between “normal” operations and “backup” operations. A backhoe digs through the internet cables, the electricity goes out, a […]

Categories
Technology & business

Risk management – developing a framework

Risk management is an essential skill for any business professional. Whether it be having a second screwdriver available on the job in case one is lost or broken, or it be having Errors and Omissions or liability insurance, we are constantly evaluating risks and the costs associated with managing those risks. In this paper we […]