Computer bots

Computer Bots, The Good And The Bad


Internet robots are known by a variety of names including spiders, crawlers, web robots, or just bots.  They’re commonly used for repetitive work such as search engine indexing because they can perform these simple tasks more quickly...

Image of a skull and binary numbers

What is ransomware and how can you protect yourself?


Pay the ransom or lose your data forever The Atlanta Police Department recently lost dashcam footage going back years and so far the clean up cost has topped a hefty $9.5 million. That number could climb even...

The words "Free WiFi Zone" and a photo of people in a bar.

Understanding the risks associated with using public WiFi


Free public WiFi can be found in just about every cafe, restaurant, airport, and hotel these days. Unfortunately, few consider or even understand that these networks are often unsecure. That means that if you’re doing something that...

three computer monitors https

What is HTTPS?


I recently wrote about how Google is no longer going to alert users that a site is secure. Instead, they’re going to alert users if a web page isn’t secure.  This is because most sites nowadays use...

image of a cloud surrounded by IoT devices

How to secure your IoT devices


Stop. Before you read what I have to say here about how to secure your Internet of Things (IoT) devices I want you to read about how a casino’s high-roller database fell into the hands of hackers...

Someone typing on a computer keyboard.

How to keep your website from getting hacked


As the 16th century English father of empiricism Francis Bacon said, knowledge is power. I’m pretty sure that if Sir Francis were alive today he’d tell you that if you want to avoid getting hacked you need...

How to create a strong password


Strong passwords secure your personal information and keep prying eyes away from seeing what they’re not supposed to be seeing whether those are emails, files, or anything else. Although Mat Honan’s experience wasn’t directly related to a...

IT technician on phone, providing IT support and troubleshooting network

Cybersecurity Planning


4 Definitive Signs Your Pricey New Cybersecurity Investment Is Destined to Crash and Burn It doesn’t matter what the catalyst was, whether something bad actually happened or you’re playing it safe by getting ahead of the threat...