I would rather “stay sharp” than “stay fresh”. My logic behind this is staying sharp means you keep a figurative “cutting edge” and are ready to “cut” when needed. Also, the opposite of sharp is dull which is useless when you need a cutting edge. Now, as for “staying fresh”, it implies that you are […]
If you want to run a virtual machine on a Mac or even a Windows host, I highly recommend VMware Fusion. I’ve been driving it for some time now and I can’t tell you how helpful the Unity mode is. Also, their support has been great.
So, for some time now, having an RDP port open to the web would probably mean trouble for you. A number of reasons you would not want to open that port up include being able to brute force the administrator account. Even if it has been renamed, it is not guaranteed to stop an attacker. […]
Microsoft can send samples of software from your PC using the Automatic Sample submission feature in Windows Defender. This would mean that even software that you develop or test will be pushed to their servers. Developers need to ask themselves if this is ok or not and turn off this feature in Windows 10. The […]
I’m sure both Google and Apple take security seriously when it comes to their mobile OS. But I actually place my trust in Apple over Google because Apple is the creator of the device and the OS. With that said they don’t allow people to look at their source code. Apple also does a pretty […]
Hello from the farm. Please take note of this document when building a small business IT environment.
I really have to give a shout out to Apple support for making my day better. I had a screen issue with my 13″ MacBook Pro and it was still under warranty. Called support folks on Friday the 16th. They sent me a box on Monday the 19th and I shipped my computer to them […]
Using updated Wp due to security vulnerabilities in my last PHP implementation. Makes a couple of things easier for admin and users. Working on getting things moved over. Please stand by for updates.
If you are an Apple user please be aware of where you get your lightning cable from. Don’t borrow one from someone. Don’t accept or purchase a cable that doesn’t come from Apple directly. A hacker has modified a Lightning cable in order to gain remote access to your device. I believe it works via […]
If you are thinking about information security within the context of your small business environment, please consider attending this webinar: Click Here Stay safe online!