Month: June 2016

WordPress

WordPress Security Update to 4.5.3

For all of you that blog, many of you choose WordPress as your platform of choice for your blog.  I run WordPress here at Tech Solutions NC, as well as on my personal blog.  WordPress recently released version 4.5.3 of their software, which takes care of a host of security issues that were exposed in […]

Why having a home firewall isn’t enough security

Why having a home firewall isn’t enough security. By Mike Ellis. Having a firewall for your computer, as discussed in my post on the security settings you need enabled on your computer, is a must for any computer system. However, while having a home firewall is good, it’s not enough security. Today, I’m going to […]

Security Tools

What Security Settings do you need enabled on your computer?

What Security Settings do you need enabled on your computer? By Mike Ellis. Before you enter your credit card on a website to make that purchase, there are things you look for that tell you that it is okay to safely do so.  Your web browser — whether it be Firefox, Safari, Google Chrome, Microsoft […]

Phishing Attacks — is there any way to prevent them?

{Editor’s Note: Today we conclude our look at Phishing Attacks, and focus on what we, as internet users, can do to prevent receiving them at all. Click the links to read part one and part two of this series.} Phishing Attacks — is there any way to prevent them? Written by Mike Ellis. Over the […]

Phishing Attacks — how do I detect them?

{Editor’s Note: We continue our look at Phishing Attacks.  Yesterday, we talked about what a phishing attack is. Click here to read part one.} Phishing Attacks — how do I detect them? While phishing attacks are extremely common in today’s internet environment, the fortunate reality is that the vast majority of phishing attack emails that […]

Phishing Attacks — what are they?

phish – verb “to try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.” ~ from dictionary.com In the connected world that […]

How do you know who to trust to work on your computer?

Trust. Integrity. Reliance. Faith. When it comes to the matter of your computer, perhaps the biggest determining factor on who should service your system really comes down to trust.  Experience is a big key, of course — you wouldn’t want someone who never turned on a computer to troubleshoot your issues, after all — but […]

Why Your Home Network MUST be Secured

{Editor’s Note: This post originally appeared on LinkedIn. Click here to read the original post.} For many of us, the thought of our home network is an afterthought at best.  Far too often we tell our friends or associates – or even those in the IT department at work – that we have nothing to […]