๏กน

Alan Sielbeck

Donโ€™t Let Crooks Hijack Your Domain

Donโ€™t Let Crooks Hijack Your Domain Doing business today you are as likely to give out your website address as your email or phone number. Your Web domain is your business identity on the internet. Donโ€™t risk falling victim to the cyberthreat known as domain hijacking. You build up a business site to represent your […]

Read More

Do You Copy? What Can Go Wrong with BCC

Do You Copy? What Can Go Wrong with BCC Try to find someone who has not โ€œreplied allโ€ when meaning to send to only one individual. Itโ€™s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake […]

Read More

Are You Banking Online Safely?

Are You Banking Online Safely? Banks and credit card companies are making it easier for us to get money on the go. We can check account balances, pay bills, and transfer funds online. We no longer even have to go into a bank or visit an ATM to deposit checks. But are you banking online […]

Read More

Online Scheduling Solves Calendar Challenges

Online Scheduling Solves Calendar Challenges Setting up a meeting or training can be such a headache. You send an email or leave a voicemail with some suggested times, and the other participants respond with completely different times, often within the time window you identified as unavailable. Sigh! The possibilities go back and forth until finally […]

Read More

Security or Flexibility: Which Matters More?

Security or Flexibility: Which Matters More? Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you canโ€™t have the best of both at once. While having absolute security or flexibility may sound good, neither is actually for the best. An entirely secure environment […]

Read More

What is a Firewall, and Why Does It Matter?

What is a Firewall, and Why Does It Matter? Hearing โ€œfirewallโ€ in the context of computing can be confusing. How does a wall designed to mitigate the impact of a building fire apply to computers? Well, imagine the rescue team using heavy blasts of water to save the day. A hacker is as motivated to […]

Read More
1 16 17 18 26