Why you need an Intrusion Prevention System (IPS) on your Workstation

Why you need an Intrusion Prevention System (IPS) on your Workstation Evolution to Intrusion Prevention Systems Intrusion Prevention Systems (IPS) are the new evolution of what was once an Intrusion Detection System. Intrusion Detection Systems detected a cyber attack happening and would alert the IT department or Information Security Department in order for them to

Microsoft Support Scam

Microsoft Support Scam I am sure you or someone you know has come across this Microsoft Support Scam: One of my peers, who is clearly a brilliant software Engineer, came up with a rather creative and hilarious solution. How would you like to be able to report this phone number to him? He will verify

Are Computers Really Disposable?

I am sure many of you reading this have answered yes, computers are disposable. I challenge the rational for your belief. Not because I am smarter than you, but because I remember. I will agree that disposable computers do exist and they are purposefully manufactured to be disposable. How many of you recall Gateway© computers

PCMatic – Is it good or bad?

I am sure you have seen the commercials that are flooding the television stations, touting 100% protection for a meager $50/year. I would advise you to review these forum discussions and reviews. Draw your own educated opinion, before you give up your credit card information.



Forum Discussions:


I cringe when I hear this guy talking about how amazing his product is. Not because it is as great as he states, but because

What’s the Point of IT?

Our History As a Nation As a veteran to this industry, raised in the trial fires of the DOS days, before Google.com existed; I have seen the reason for IT get lost in the mindset of American business owners and managers. As a growing history buff and lover of the deep rooted history of the creation

Secure Remote Access

Do you currently have remote access to your network, from anywhere you need it? Are you using Remote Desktop Protocol (RDP) or Remote Desktop Connection (RDC) as the means for such remote access? If you answered yes to both of these questions, then you need to understand that you are utilizing the most insecure method