The Latest in Tech Today

Doc in the Big Box – Medicine for the Masses

Doc in the Big Box – Medicine for the Masses

Doc in the Big Box - Medicine for the MassesOne of the most significant societal changes is the demand for convenience in every area of our lives. We spend time online looking for discounts and options, yet we have increasingly higher expectations for products and...

read more
Revised Apple Policy Rules for Apps in App Store

Revised Apple Policy Rules for Apps in App Store

Revised Apple Policy Rules for Apps in App StoreDevelopers of apps distributed through the Apple App Store will be subject to a new set of guidelines and policies distributed this week. Some of these changes are controversial. Some of the revisions include mobile...

read more
Getting Your Fix of Nostalgia

Getting Your Fix of Nostalgia

Getting Your Fix of NostalgiaHave you ever found yourself nostalgic for some of the commercials, tv shows, and videos from your youth? If so, you will love The Internet Archive, VHS Vault that has more than 20K recordings for you to go through and relive your past....

read more
Don’t Store Data You Don’t Need

Don’t Store Data You Don’t Need

Don’t Store Data You Don’t NeedToday all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...

read more
Are you Secure — Depends on Many Things

Are you Secure — Depends on Many Things

Are you Secure -- Depends on Many ThingsIf a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies spending lots...

read more
You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An AttackHow much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just as...

read more
Hackers Target Large Databases

Hackers Target Large Databases

Hackers Target Large DatabasesIt was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...

read more
Big Tech taking Advantage of Our Kids

Big Tech taking Advantage of Our Kids

Big Tech taking Advantage of Our KidsTechnology costs money.  The sooner that everyone learns this the safer we will be.  There is no way to offer technology services for free you will pay some way.  For many that cost comes through the loss of private information. It...

read more
Businesses Beware: Ransomware is on the rise, again

Businesses Beware: Ransomware is on the rise, again

Businesses Beware: Ransomware is on the rise, againCompanies are under attack from Ransomware gangs and are paying a high price.  Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...

read more
Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud AppsThe cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data.  I constantly have to explain to...

read more
Passwords: Length trumps Complexity

Passwords: Length trumps Complexity

Passwords: Length trumps ComplexityComplex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe.  The reason is that people have to write them down. They...

read more
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses - Like it or NotThe world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies are...

read more
Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting AppCreating a secure voting application is near to impossible.  WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...

read more
Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs WorldwideLast year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...

read more
Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at RiskThere are robust computers in every employee’s possession.  And they carry them everywhere. Yes, I am talking about their cellphones.  On these devices, they can download 1000’s of apps. These apps allow them to create...

read more