Leaving Computers On All The Time Turn off, or not? I was recently asked the following question. "I say that leaving my computer on overnight does not expose it to hacking, but some disagree with me. (You advised me to leave it on as ... Best Practices Hardware Maintenance Aug 8, 2023
S.M.A.R.T. is smart for hard drives S.M.A.R.T. is self-monitoring, analysis, and reporting technology for hard drives. This technology used to be an optional component on hard drives, but it is now included on all newly manufactured har... Best Practices Hardware Monitoring Aug 8, 2023
Why are SOHO Routers Insufficient? There has been a lot of talk in the news lately about the inadequacy of SOHO routers, and I couldn't agree more. For more than ten years, I have been advocating the use of real, XTM (extensible threat... Hardware Router Aug 8, 2023
Understanding Security Appliances What is a security appliance A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the interne... Cybersecurity Firewall Hardware Router Aug 8, 2023
Why We Must Block Advertisements Blocking advertisements specifically and by category can save your computer from getting infected or otherwise hacked. I have been talking about this fact for years and have been actively blocking adv... Best Practices Cybersecurity Data Privacy Aug 8, 2023
Computer Security & Maintenance Self-Assessment The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to re... Assessment Cybersecurity Aug 8, 2023
Expected IT Hardware LifeCycle Here's an in-depth exploration of expected IT hardware life, leasing IT hardware, and budget planning for hardware replacement. Question posed by reader Amanda: I am better trying to understand the ac... Asset Management Hardware Aug 2, 2023
YubiKey with Password Safe This article is all about how to enhance an already great password management tool with two-factor authentication. Authentication concepts Single-factor authentication Single-factor authentication is ... MFA Password Security Aug 2, 2023
Use TraceRT for WAN Performance Optimization This article will help network administrators determine the best DNS server settings to use for WAN lookup settings inside of a perimeter security appliance. The DNS server settings discussed here are... Best Practices Networking Aug 2, 2023
Keyboard Shortcuts Keyboard shortcuts can save you time and make you more efficient with your computer. Here are some common keyboard shortcuts. Most Windows applications Type To Get Ctrl + S Save Ctrl + Z Undo Ctrl + X... Productivity Aug 2, 2023
A Guide to Passwords and Password Security What is a password, exactly? A password is a string of characters that you give to verify that you are you when you log into a computer system. On most systems, a password is between 6 and 8 character... Best Practices Password Security Productivity Aug 2, 2023
Document Retention Guidelines How long should you keep financial records? The list below can help you determine how long to keep documentation. Be sure to properly destroy any documentation with personally identifiable information... Best Practices Compliance Data Privacy Retention Aug 1, 2023