RSS
-
Recent Posts
Recent Comments
Archives
- June 2017
- February 2017
- September 2016
- August 2016
- June 2016
- January 2016
- April 2015
- January 2015
- February 2014
- January 2014
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- May 2010
- April 2010
Categories
Meta
Category Archives: IT and Computer Security
Single Use Credit Cards – Is it Right For You?
One way to avoid the danger and pitfalls of online shopping is with single-use credit cards. We discuss what they are and how they benefit you. Continue reading
Tips for Keeping Your Password Secure
Many people leave their online accounts open to hackers with simplistic, easy-to-guess internet passwords. Superior Solutions provides tips for securing your password. Continue reading
Posted in Cyber security, IT and Computer Security, Uncategorized
Comments Off on Tips for Keeping Your Password Secure
Tips to Avoid Digital Hoarding
Digital hoarding has become a major problem in the cyber-age as people refuse to get rid of files and e-mails which then clog up their hard drive space. Continue reading
Posted in Cyber security, IT and Computer Security, Uncategorized
Tagged Cyber Security, digital hoarding, email storage, hard drives
Comments Off on Tips to Avoid Digital Hoarding
Identify IT Vulnerabilities with a Security Assessment
The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading
Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)
Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading
Posted in Cyber security, IT and Computer Security, Uncategorized
Tagged credit card security, cyber, Cyber Security, Hackers, identity theft, threat
Leave a comment
Don’t Be a Victim: How to Prevent Identity Theft (Part One of Two)
Identity theft has become the crime of the new millennium. Most people have heard of it but are unaware of the methodology of these criminals and the ways to prevent them. Continue reading
Posted in Cyber security, IT and Computer Security, Uncategorized
Tagged cyber protection, Hackers, identity theft, skimmers
Leave a comment
Cyber Security Bill Stalled… But Sponsors Still Push On
Cyber security continues to be an ongoing challenge with no easy answers… Earlier this month, the senate failed to pass a bill known as the Cybersecurity Act of 2012. The sponsors of the bill are still pressing the issue with … Continue reading
Should You Put Your Data in the Cloud? Is it Safe?
Superior Solutions shares some of the key features, including security features, you want to look for in a cloud network storage provider. Continue reading
Is It Ok For My Child To Be On Social Media?
The question must be asked—is online social media still an adults-only realm or should children be allowed to dip their toes in these waters? Continue reading
Posted in IT and Computer Security, Uncategorized
Tagged child safety, Cyber Security, cyberspace, online-security, social media
Leave a comment
To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment
Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading
Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking
Tagged APT, China, Cyber Crime, Huawei, internet security, malware, threat, Trojan
Leave a comment