How to handle Suspicious E-mail

How to handle Suspicious E-mail

Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these guidelines to help protect yourself from phishing scams sent through e-mail. Read more Published with… Read More

What to do if you’ve responded to a phishing scam

What to do if you’ve responded to a phishing scam

If you suspect that you’ve responded to a phishing scam with personal or financial information or entered this information into a fake Web site, take these steps to minimize any damage. Read more Published with permission from TechAdvisory.org. Source. TAGS: NEWSLETTER_TECHTIP, PHISHING, TECH TIPS

Manage and Collect Data Better with FormSpring

Manage and Collect Data Better with FormSpring

For businesses of all types and size, managing data online is critical to the smooth operation of a website. However, incorporating data collection programs can be time consuming, especially if any of your data is “time bound” – meaning it’s only valid and useful during a specific period of time. Here’s a solution. FormSpring provides… Read More

Beware the Kneber Botnet

Beware the Kneber Botnet

A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies. Called the Knebner botnet after the name in the email used to register the… Read More

Beware of Vulnerabilities in Windows and Office

Beware of Vulnerabilities in Windows and Office

Microsoft recently released a number of security bulletins and patches addressing vulnerabilities in Windows and Office that are of high risk to users. It’s widely believed that many will be exploited by hackers within the next 30 days. One of them could potentially allow hackers or malware authors to easily compromise systems by tricking users… Read More