Category Archives: IT and Computer Security

Single Use Credit Cards – Is it Right For You?

One way to avoid the danger and pitfalls of online shopping is with single-use credit cards. We discuss what they are and how they benefit you. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

Tips for Keeping Your Password Secure

Many people leave their online accounts open to hackers with simplistic, easy-to-guess internet passwords. Superior Solutions provides tips for securing your password. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Comments Off on Tips for Keeping Your Password Secure

Tips to Avoid Digital Hoarding

Digital hoarding has become a major problem in the cyber-age as people refuse to get rid of files and e-mails which then clog up their hard drive space. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , | Comments Off on Tips to Avoid Digital Hoarding

Identify IT Vulnerabilities with a Security Assessment

The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)

Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Don’t Be a Victim: How to Prevent Identity Theft (Part One of Two)

Identity theft has become the crime of the new millennium. Most people have heard of it but are unaware of the methodology of these criminals and the ways to prevent them. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Cyber Security Bill Stalled… But Sponsors Still Push On

Cyber security continues to be an ongoing challenge with no easy answers… Earlier this month, the senate failed to pass a bill known as the Cybersecurity Act of 2012.  The sponsors of the bill are still pressing the issue with … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Should You Put Your Data in the Cloud? Is it Safe?

Superior Solutions shares some of the key features, including security features, you want to look for in a cloud network storage provider. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , , , , , | Leave a comment

Is It Ok For My Child To Be On Social Media?

The question must be asked—is online social media still an adults-only realm or should children be allowed to dip their toes in these waters? Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment