Jeremy's blog

Make Your Wireless Network More Secure

Home and small business wireless networks (WiFi) connect to the Internet through a router or another access point.

The wireless signals transmitted are easy to intercept. Someone sitting in a car outside of a home or business or your neighbor can pick up wireless router signals and connect to the Internet and maybe your internal home network.

You Can't Buy Computer Security - It's a Process, Not a Product

You think you're safe because:

  • You have a firewall that separates and protects your network from the Internet;
  • You have an anti-virus/anti-spyware/anti-spam solution to protect your computers from malicious software and junk email;
  • You keep your computers up-to-date with the latest security patches; You use good passwords;
  • And you think-Why would a hacker care about us? We're not a target!

Guess what? You aren't as safe as you think you are.

Don't Get Zapped - Prep for Summer Storms

This time of year brings severe weather to Wisconsin, and 70% of power outages are caused by storms.

Tobin in the News

We had a nice article in a local paper talking about Tobin Solutions and the non-profit Jeremy Cherny is starting up.

The article is HERE.

-Jeremy

 

"Wake-Up" program cuts energy costs

To reduce electricity bills, a Tobin Solutions client began shutting down computers at night. This helped the company "go green" by reducing power consumption and had the added benefit of significantly lowering energy costs.

What is the Internet of Things? And What About Security?

You and I and our computers are on the Internet. The phrase 'Internet of Things' refers to all the other devices that are getting connected to the Internet. TVs, appliances, game consoles, wearable items like upcoming smart watches and clothing, thermostats, get-fit devices, and more are all getting connected to the Internet.

This is all fun, possibly useful, and it will be interesting to see where it all goes. It's clearly inevitable however that the implications are just now being considered.

Most Viruses Spread Through Deception

A recent security report noted that 70% of computer infections were transmitted through deception. Computer users were fooled into clicking links and opening attachments in emails and websites that appeared legitimate. In fact, these were carefully crafted malicious fakes that look just like real sites we use every day. Emails and sites that look like something you'd receive from Amazon, FedEx, UPS, ADP, Apple, Google, your bank, your mortgage company, and more lulled people into a false sense of security through familiarity.

Dealing Without My Phone

I was driving to the office this morning and realized I was going to be late for a meeting. I attempted to call the person I was meeting with. I reached for my phone and it wasn’t there. I’d left it at home. I was half-way to work and thought about turning around to go home to retrieve it but then I’d have been really late and proceeded to the office. I immediately had a physical sensation of missing something. My mind also started to create stories of my car breaking down and people in my life with emergencies trying to reach me.

Tips for Finding Files and Folders in Windows

I ran across this helpful page that gives advanced tips for searching your files and folders in Windows. This is a great reminder and time saver. http://windows.microsoft.com/en-us/windows7/advanced-tips-for-searching-... -Jeremy

Pages

Subscribe to RSS - Jeremy's blog