This is part 3 of 4 of the Personal Information Security Redux. Since there are things that we cannot protect ourselves from online, the next best solution is to prevent them from harming your computer. This can be accomplished on Windows … [Continue reading]
Where are we most vulnerable online?
This is part 2 of 4 of the Personal Information Security Redux. While assessing ways to stay safe from personal information security breeches online, it is critical to understand where we are most vulnerable. Picture your entire information … [Continue reading]
Personal Information Security Redux Part 1 of 4
Back in October 2010 I wrote an article about personal choices being the most powerful information security tool. It is now January 2015 and while other things have changed, this simple fact has not. You are still the most critical piece in both your … [Continue reading]
See Who Owns Your Local Politician
A bright young developer has come up with a way for us to easily see who the top contributors to political candidates are using a simple browser plugin. The plugin is called "Greenhouse" and it is available for Chrome, Safari and Mozilla. Once you … [Continue reading]
Information Security Friendly Hiring
Recently while discussing an ordeal one of my customers went through due to a bad hire, we started discussing a different criteria that makes a big difference with hiring. The benefit of experience is seeing patterns and applying them to other … [Continue reading]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 80
- Next Page »