by William Cunningham | Oct 3, 2023 | Internet Security, Uncategorized, Windows
Introduction There is no such thing as privacy relating to the use of Internet resources. Your activity is being logged whenever you visit a website or use your operating system or web browser. Data about you and your activity is being captured mostly for marketing...
by William Cunningham | Aug 1, 2023 | BCWJ, Internet Security, Uncategorized
Introduction In today’s interconnected world, where technology and the internet play a central role in our daily lives, maintaining robust internet security measures is of paramount importance. Rapid technological advancements have brought numerous benefits, but...
by William Cunningham | Apr 2, 2023 | Uncategorized
Introduction Hackers can breach your security defenses by using social engineering tactics. Social engineering is the use of deception or trickery by hackers to manipulate you into exposing sensitive information that may be used for nefarious purposes, e.g., to get...
by William Cunningham | Jun 1, 2022 | Internet Security, Uncategorized
Introduction Cyber threats are constantly increasing, so we must remain diligent in protecting our data and online resources. I have worked in Information technology since the 1980s, and I have seen many problems that could have been avoided, especially within the...
by William Cunningham | May 31, 2020 | Uncategorized, Wireless Networks
Introduction An increasing number of devices are using wireless technologies to connect to each other and the internet in offices and homes. A Consumer Reports article states that a recent report estimated that the average household will have about 50 wirelessly...
by William Cunningham | Dec 2, 2019 | Internet Security, Uncategorized, Wireless Networks
Introduction How can you protect yourself if you must use a public Wi-Fi network for work that involves sensitive information (sign-on credentials, banking, etc.)? A “public Wi-Fi network” is defined in this article as a Wi-Fi network where the general public has...