BYOD Rules, Network Security & Your Business

BYOD Rules, Network Security & Your Business

The integration of sophisticated interfaces in modern devices has made it difficult to draw a line between personal and business usage. Nearly a decade back, it was fairly easy to differentiate between data/software/applications targeted or being used at an enterprise level and those at a personal scale. The data that is being circulated around can be classified as business and non-business. Each has its own specific attributes with respect to sharing and security management. Read More »

Security Tips

CryptoLocker – Holding Your Computer for Ransom

CyptoLocker - Holding Your Computer for Ransom

In September 2013 a new type of malware was discovered to be making the rounds in computers running Microsoft Windows. This new malware is not really a virus because it typically requires a user to open an infected e-mail. What makes this malware particularly dangerous is what it does once it infects your computer – it holds your files for ransom. Read More »

Encryption

How to Backup Your Files for Years to Come

How to Backup Your Files for Years to Come

It is amazing how fast life can go by sometimes. I was recently looking at some of my digital photos and realized that I have over 28,000 digital photos saved since 2002. That was the year I bought my first digital camera. Back then I didn’t realize how many I would actually accumulate, but after starting a family since that time, the number of photos has grown exponentially. Read More »

Data Backup

How to Secure the Linksys EA4500 Wireless Router

How to Secure the Linksys EA4500 Wireless Router

Wireless routers, by default, are unsecured when you connect a router for the first time. This is important to know as you will need to take the necessary steps to secure any wireless router that you have just purchased. With regards to Linksys routers, the steps to secure the router are very similar, so if you have trouble finding proper steps to secure your Linksys router, you can usually follow steps for another Linksys router. Read More »

Networks

The Top 3 Most Dangerous Computer Viruses

The Top 3 Most Dangerous Computer Viruses

Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all). Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem. Read More »

Security Tips

The Power of 6 Seconds: Vine & Your e-Commerce Business

The Power of 6 Seconds: Vine & Your E-Commerce Business

Unscrew the cap on a bottle of water. Put a stamp on an envelope. Open the door to let the dogs outside. These are a few examples of everyday tasks that usually take about six seconds to complete. But now, thanks in part to an innovative video feature called Vine, companies including e-commerce businesses are now using exactly six seconds to spread the word about who they are, and what they do. Read More »

Video Streaming

SEO Be Damned. Why Your Blog is About You.

SEO Be Damned. Why Your Blog is About You.

After I decided to change the direction of Technically Easy, I have been thinking more about what content I would like to publish on Technically Easy. Of course, as I started to think about the content, other questions started to pop in my head. How often should I publish posts? What long should each post be? What type of posts should I write? How many guest posts should I accept? The odd thing is that I started Technically Easy over six years ago, and many of the questions I asked myself were the same ones I asked myself when I first started. Read More »

Websites and Blogging

What is DOCSIS?

What is DOCSIS?

hen I first began using the Internet, I used a dialup modem to connect and still remember the nice noise the modem made when establishing a connection. That was over 16 years ago, but for the past 14 years I have been using a broadband Internet connection through my cable provider. Over the years I have seen my Internet connection speeds increase for both download and upload. Recently I have been contemplating switching Internet providers – mainly because of price – and have begun researching cable modems. Read More »

Technology
  • Get Free Email Updates

  • Follow Me

    Follow Us on Facebook Follow Us on Google+ Follow Us on Twitter Follow Us on Pinterest Follow Us on RSS
  • Recent Posts