I recently posted on our Facebook page about a recent development in our area of Northern Minnesota – but it’s happening everywhere as well. A client received a phone call from a man claiming that he knew she had a Microsoft Windows computer and that it was on its way to failure – something about…
Windows Live Mail, Connecting to Cold Snap-Provided Email
Connecting To Cold Snap Technology Email via Windows Live Mail This tutorial will teach you how to use Windows Live Mail to connect to CST Email services. While this is focused on setting up Windows Live Mail, some of these elements are similar to other Email client programs, and services. For a details on connecting with…
Mobile Security Breaches: A Historical Snapshot of Mobile Security
Seven percent of U.S. families endure the agony of identity theft, according to the 2013 Montana Department of Administration’s Cyber/Data Information Security FAQ. Primary points of attack include credit card data, online banking information and social security numbers. Easily accessible, unencrypted portable devices remain among the most common points of security breach. Whether from a…
Common Failure Symptoms
Much like your vehicle can give off a weird popping, clicking or some other sort of noise or reaction that tells you for sure something has gone wrong and needs attention, computers can do the same. In this article, I hope to help you figure out what something could mean – and that in no…
Why You Should Make Your Website Responsive
You spent plenty of hours working on your mobile site, getting it just right, only to discover Google is penalizing both your mobile and desktop sites because of coding issues that flags duplicate content. While Google is generally good about recognizing the difference between mobile and desktop sites, it is entirely possible to encounter some…
Spyware, Malware and PUPs
What do these words mean and how are they relevant? I mean come on; a PUP sounds adorable! Well, puppies are pretty adorable, but PUPs are less so. One will damage your carpet and furnishings, the other will slow down and compromise your computer. “PUP” is an acronym for “Potentially Unwanted Program” and they are…
Mobile Management Tips for Your Business
Employees have access to two or more devices in the workplace, creating a ‘bring your own device’ (BYOD) landscape that makes it imperative for businesses to examine the cross-use of personal and business devices in the office, a recent study conducted by Apperian confirms. There was a time when employers were more likely to supply…
Windows 8
Windows 8 – How and what is it? Windows 8 is the newest operating system from Microsoft, the successor to Windows 7. It provides a few new things and while keeping some features the same – it generally could be said that Windows 8 is a completely new system. Firstly, why is it new? Windows…
What Your Business Should Know About Choosing a VPN
proxyMore than 600 data breaches occurred in the U.S. last year, as well as nearly 50,000 reported security incidents, according to an annual Verizon report. A large portion of those breaches were accomplished on mobile devices, and with public Wi-Fi everywhere you turn, a VPN could make or break your data security. Photo by Ludovic.ferre…
Business and Government Get Hit by Identity Theft, Too
Banks lose millions of dollars every year by having to compensate identity theft victims, and so they’re developing new ways for consumers to protect themselves. While banks, governments and corporations are working hard to lessen the impact of identity theft, the bulk of the responsibility still falls upon the consumer. Have you ever been a victim of identity theft? How did it affect you?