Technology

Tech Talk: Securing your Internet Connected Devices

May 17, 2017 - 17:33

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

More and more, we are seeing the results of many devices connected to the Internet with little to no security. We now have security cameras, refrigerators, televisions, and other devices that all connect to the Internet.

Photos tell where you have been

April 28, 2017 - 10:19
'Map' by Aram Bartholl, part of the show 'From Here On' during Rencontres Arles, France 2011 via Wikipedia

Apple and Google phones now add location metadata by default to every photo taken with them. Social media apps then use this data when you share these photos.

Not only are you telling anyone who sees the photo and knows how to view metadata where you took the photo, but now several companies know where you have been if you give them access to your photos. If you share your photos on Facebook, Facebook can determine where you went on vacation, where you hang out with your friends, and where you take your kids to eat.

Relying on public key encryption for business

February 02, 2017 - 19:18
0 comments

Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.

We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.

Surviving Computer Failure

February 01, 2017 - 08:56
0 comments

It is good to plan for computer failure. It will happen eventually and probably at the worst possible time. The first thing that you need to do is determine what you use your computer for and what information on it you need.

If determining what you use on your computer seems daunting you can back up the entire computer. There are a number of cloud based backup solutions that allow you to do continuous backups for a fee when you are online, some of the better known solutions are IDrive, Carbonite, and CrashPlan.

For simplicity's sake give cash, not Visa gift cards

January 14, 2017 - 16:41

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

I recently tried to use a Visa gift card that I received over the holidays. The cashier asked me how much money the card had on it. I responded that I wanted to use the whole card towards my bill.

Tech Talk: Feel right at home with travel storage devices

January 06, 2017 - 19:49

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

Over the holidays, many families spend time traveling in their cars. There are number of devices that make can provide entertainment while traveling. The two devices to consider are mobile hotspots and mobile storage devices.

Pages

Subscribe to RSS - Technology