Latest Articles

Category: IT Security

creative-commons-copyright-featured

What Is a Creative Commons License?

If you use online media for your own purposes, like featuring images in company blog posts or using songs for an advertisement, it’s vital to understand Creative Commons and how it lets you use creative works. Let’s look at Creative Commons and how to interpret its terms. What Is Creative

Read More »
computer-time-featured

An Introduction to How Computers Handle Time

Time is something that’s both straightforward and incredibly complex at the same time. On one level, it’s easy to check what the time is, and time is, at its simplest, a series of increasing seconds. However, keeping track of time across the world is a much more difficult practice, and

Read More »
markdown-intro-featured

What Is Markdown? Why It’s Great for Writing Online

If you do any writing online, whether for your job or personally, you should know about Markdown. It’s a simple system that allows you to focus on your text and basic formatting, without excess details getting in the way. We’ll introduce you to Markdown, including what it is, how it

Read More »
download-software-locations-featured

Where Should You Install Software From?

Most people install software often, but not everyone thinks about where they’re installing from. Not all software download sites are trustworthy, so it’s wise to consider where you install apps from. Let’s look at the safest places to download software from so you aren’t surprised with malware or extra junk

Read More »
government-bill-google-featured

How a New Government Bill Could Change Online Services

A bill currently making its way through the federal government could have effects on services that companies like Google and Apple offer. If you have a Google Business profile, you might have recently gotten an email from the company about this legislation and its potential effects. Let’s take a look

Read More »

Failing to Password-Protect Its Data Took This Spamming Giant Down

Spam, which refers to unsolicited junk email, has plagued the internet for decades. Whether it’s annoying weight loss advertisements, harmful email attachments, or scams, nobody likes spam. Its popularity is largely due to its ease of use — sending a million spam emails is cheaper and simpler than sending even

Read More »

4 Browser Security Dangers to Know About

Modern browsers contain plenty of convenient features. From automatic spellcheck to page translation, there’s so much functionality that it’s easy to forget about browser security. Let’s take a look at a few different potentially dangerous aspects of a web browser that could compromise your security or personal information. Browser Autofill Exploit It’s

Read More »

What We Can Learn From 2016’s Worst Passwords

We’ve discussed the importance of password security before. While passwords have some inherent issues, they are the most common form of authentication. Unfortunately insecure passwords are still very common. A new study reveals 2016’s worst passwords as well as some interesting information on how people think about security that we

Read More »
IT Security
Don Houk

What Are Flash Drive Viruses, and How Can I Stay Safe?

Flash drives are a convenient way to store and transport data. Whether your employees use them to share files among teams or archive older data, you probably have USB sticks floating all over your organization. However, the ubiquity of these drives can lead to serious threats. Recently, a new type

Read More »

How Was the Internet Attacked in October 2016?

On October 21, computer users in the United States experienced widespread issues when trying to access a variety of websites. Those on the East Coast had the most problems, as websites like Twitter, PayPal, Spotify, and GitHub were all unreachable for several hours. What caused this outage was a DDoS

Read More »

How You Should Respond to the Dropbox Hack

Four years ago, Dropbox was hacked. At the time, public information said that only email addresses were stolen. We now know a copy of users’ encrypted passwords were also taken. Knowing that your information could be compromised, what should you do to protect yourself? Since the stolen passwords were appropriately encrypted,

Read More »
IT Security
Don Houk

Why Using Windows XP Is Not a Safe Option

On April 8, 2014, Microsoft ended support for Windows XP. This means that although the operating system (OS) continues to function, it isn’t receiving any security patches or other important updates from Microsoft. You would think that most businesses would have jumped ship to a newer OS to avoid working

Read More »
two-factor-authentication
IT Security
Don Houk

How to Improve Security with Two-Factor Authentication

In today’s ever-connected world, security is of paramount importance. With both personal and business data being vulnerable to attack, sometimes just using a strong password isn’t good enough to keep you secure, this is where two-factor authentication comes into play. There are tons of security threats online these days, such

Read More »
IT Security
Don Houk

Why Password Security is Not Optional

Nearly every day you hear another story about a company whose network was attacked, and the Cloud Security Alliance just reported that around 22% of businesses that suffered a data breach happened because of compromised credentials. We know that password strength is incredibly important, yet people still use weak passwords

Read More »