Category Archives: Safe Computing

The Keys to the Kingdom

One of my clients recently mentioned to me that they are preparing for an annual inspection required by the regulations that govern their industry. One of the issues that they are dealing with is an expanded scope of due diligence with regard to their vendors; they are now being required to formally vet any vendors…

Preventing the Heartbreak of Lost Data

One of the questions I hear most often from my residential clients as they drop off an ailing PC is, “will I lose all of my pictures?”  In many cases, I am able to save most, if not all, of the data on their hard drives (pictures, emails, addresses, browser bookmarks, etc.)  My commercial clients…

The Safe Computing Triad

In Beware of Social Engineers, I wrote that I’ve recently had several clients that have contracted nasty malware that masquerades as security software and claims that the victim’s PC is infected.  It then offers to clean up the infections – if you pay for the software.  Of course, by that time the damage is done,…

Beware of Social Engineers…

This is a technology-focused blog, so I’m not talking about those folks trying to affect our general society using political means. I’m talking about the ones who practice social engineering for the purpose of gaining some control over or unwarranted compensation from your use of your computer.  In this context, Social Engineering has traditionally meant…