Computer security

The following blog posts have the category Computer security

Blog Home | View all blog categories


Alysia Brooks

Phishing scams - If you think it won't happen to you, think again. Take a look at this Article from the Cincinnati Insurance Company's blog post written by Ronda Bradley.
Continue Reading...

Rememberwhen you got your first password? Think back, and try not to get too sweetlysentimental about it. Maybe it was the one associated with your AOL accountback when the World Wide Web was a novelty and e-mail was a cutting-edge modeof communication. How many more passwords have you created and accrued sincethen? A handful? A hundred? Too many! It's enough to make a person long for1999.
Continue Reading...

In one of our previous posts Cyber Security: Is Your Business Safe? , we discussed cyber security weak spots, and the different things you can do to protect your Ohio business and your clients.
Continue Reading...

For their abilities to help a business run smoothly and thrive, today's Internet-related technologies leave business owners wondering if the companies they have worked so hard to build are truly safe in cyberspace. Here, we take a look at weak spots, and how you can protect your business and your clients in Ohio.
Continue Reading...

Today many of us have a multitude of passwords to keep track of at work and at home. As passwords multiply it is easy to succumb to the temptation of using easy to guess words or simply leaving a sticky note on your computer. But these are generally bad ideas. Better is to come up with a strong password and keep it secret.
Continue Reading...

View all blog categories


Top