inmotion hosting banner

Inmotion Hosting review

This article presents a candid review of Inmotino Hosting, focused on both “reseller” and “end user” accounts. Ease of use, setup, speed, and configuration.
Read More
Pixabay - Credential theft - phishing

Credential theft

This presentation will help you understand the risks, recognize when you have been compromised, and avoid credential theft
Read More
payment cards

Payment card theft

Seems every day there are new reports of payment and credit card theft. Explore how payment card theft happens, and how to protect yourself.
Read More
Phishing is fun!

Phish for phun and profit

Phishing is a real problem, and that problem is only increasing in frequency. Phish attacks come in many different forms. Everyone is affected by phishing. Whether it be that a credit card number is stolen from your family member, or your friend gets their Facebook account hijacked, or you have…
Read More
Pixabay - postman

WordPress Plugins – 2.1 Mail Relay

Let me ask an honest question.  Would you rather be doing business with “bobrx153@hotmail.com” or “bob@randolf.com” ?  Which one looks more professional?  Which one looks more trustworthy?
Read More
Pixabay - Jigsaw interconnections

WordPress Plugins (1.0 Introduction)

WordPress is an incredible Content Management System — and it is free!  WordPress off the shelf is just that — a content management system.  The best part of WordPress is that it is extensible. 
Read More
Pixabay - Locks

WordPress Plugins (2.0 Security: Confidentiality, Integrity, Availability)

This post is a part of the WordPress Plugins discussion threads and focuses on Plugins that increase the Security of your WordPress site. Just as with all WordPress Plugin recommendations, only “free” Plugins will be considered. Security First, a definition for this very important section. Security is protecting the Confidentiality,…
Read More
pencil erasers - revise erase repeat

WordPress Post Revisions

Have you worked hard on a post, only to forget to save the post? I have. If you are looking to “autosave” your WordPress posts, this post is for you!
Read More
Pixabay - binary-2175285_1280 - Andoid humanoid

Using Artificial Intelligence to create predictive systems

The term Artificial Intelligence (or AI) was coined in the mid 1950s.  AI technology was heavily funded by the Department of Defense for many years. Unfortunately, the practitioners at the time were overly optimistic and failed to overcome some of the difficulties that they faced. By the mid 1970s, funding…
Read More

Business & Technology Planning

This article explores basic ideas that you should keep in mind as you are starting or continuing your business. It is intended to provoke deeper thoughts for you and your executive team. From business continuity, to free coffee and free WiFi, we’ll look into ideas that are important to businesses……
Read More

How to prevent content filtering from affecting your web site

Content Filtering companies have gained quite a bit of traction in the Computer Network Defense (CND) industry. The goal of content filtering is to attempt to stem the carnage that malicious sites can wreak on unsuspecting individuals and companies by blocking access to malware and other forms of ransomware.  The…
Read More
Theft through the screen

Account compromise – how to not be a victim

Our online identity IS our identity. Someone masquerading as you is potentially a dangerous situation, but it is at least creepy. The problem is, as sure as everyone will pay taxes this year, we will all have our online identity compromised. What do you tell your colleagues who have had…
Read More

Centrally managing WordPress sites

Managing multiple WordPress sites is no easy task. While managing a single WordPress site in itself can seem difficult at times, managing many WordPress sites concurrently requires keeping track of multiple security updates, different Plug-In updates, Theme updates, backups, usernames and credentials, and Firewall settings. Fortunately, this is a common…
Read More

Zero day, 0day, ohday, oh my!

Hackers have a few things in their favor when it comes to getting into your network and stealing data.  One of those things is the elusive zero day.   When it comes to hacking, a zero day is an “exploitation against a publicly unknown vulnerability”. But hackers don’t need a zero…
Read More
Pixabay - an old rotary phone in a spooky yesterworld

The end of the (land) line

So you’ve looked at your local phone bill and it was… oh my, I’m paying that much for a simple landline phone number? This doesn’t seem right! How can I be paying $40 a month for a landline phone (base price around $15/month, plus “options” price like call waiting around…
Read More
Goal-Plan-Success

Business Continuity Planning

Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business continues to operate even during adverse situations. BCP is the work put in before those imperfect days, in order to smoothly transition between “normal” operations and “backup” operations. A backhoe digs through the internet cables,…
Read More
Risks can feel a lot like piranha ! (photo courtesy Pixabay)

Risk management – developing a framework

Risk management is an essential skill for any business professional. Whether it be having a second screwdriver available on the job in case one is lost or broken, or it be having Errors and Omissions or liability insurance, we are constantly evaluating risks and the costs associated with managing those…
Read More
SAFE - keyboard key

Computer security hardening – safeguarding your computer

Computer Security.  Kind of scary, actually.  With the likes of Target going down to hackers in late 2013, and a large attack on Home Depot in 2014, what can the rest of us do?  If Home Depot can be compromised, how can I protect myself? The bad news — you are…
Read More