Category Archives: Security – News and General

Improved internet security with 3 easy tips

Sec C 900

Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software. There are a few other methods that are less often talked about – here are three […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed

Easy tips for better internet security

Sec B 900

With over 3 billion internet users around the globe totaling roughly 40 percent of the population, the internet is rife with opportunities for hackers to steal your information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon. It therefore pays to take extra precautions when surfing the […]

Also posted in General Articles B | Tagged , , , , , , , | Comments closed

Better online security with these 3 easy tips

Sec A 900

Most of us know we should make our passwords more difficult (sorry, folks, “1234” or “qwerty” just doesn’t cut it) and use an up-to-date version of antivirus software. But all too often, we opt for an easy life – use familiar passwords and put upgrades on the back burner. But security can be simpler than […]

Also posted in General Articles A | Tagged , , , , , , , | Comments closed

Added security to protect FaceTime and iMessage

Security_Feb18_C_PH

Whatever services and systems we use to share, store or transfer personal and business information online, we want the reassurance that our data is safe and that everything possible is done to prevent it from falling into the wrong hands. But we also know that security breaches happen, as they did with the large-scale celebrity […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed

How Apple made FaceTime and iMessage safer

Security_Feb18_B_PH

We have become acclimatized to ever-present threats to the security of the information and files we share and store online. But we all still want our data to be as secure as possible and, following high-profile breaches such as the celebrity photo leaks of 2014, if anything the issue of online security is even more […]

Also posted in General Articles B | Tagged , , , , , , , | Comments closed

FaceTime and iMessage just got more secure

Security_Feb18_A_PH

Whether we use them for business or pleasure, we all want the confidence that the online services we use to store files, post life updates or check our email are given adequate security protection to safeguard our information. But since high-profile breaches such as the celebrity photo leaks of 2014, the security of Apple platforms […]

Also posted in General Articles A | Tagged , , , , , , , | Comments closed

Why you need to know about the Poweliks threat

Security_Jan28_A_PH

Most of us have suffered the horrors of a computer virus at some point, and we know the damage that can be caused by these security infections. Our work gets disrupted as IT systems go down and, if we’re really unlucky, sensitive and valuable data might be lost or even leaked. But there’s a silver […]

Also posted in General Articles B | Tagged , , , , , , , , , , | Comments closed

How to protect yourself against Poweliks

Security_Jan28_C_PH

Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware – however much disruption and damage they cause to our systems – can be detected and removed thanks to the tracks they leave as they create havoc, […]

Also posted in General Articles C | Tagged , , , , , , , , , , | Comments closed

What is Poweliks and why should you care?

Security_Jan28_B_PH

As far as viruses, worms and other security infections go, there are probably none quite as frustrating as Poweliks. While most threats can wreak havoc on your computer system and cause untold damage to your business as day-to-day processes are interrupted by unstable IT, information leaks and data losses, the majority at least leave a […]

Also posted in General Articles A | Tagged , , , , , , , , , , | Comments closed

What to learn from Sony’s security breach

Security_Jan12_C_PH

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they […]

Also posted in General Articles C | Tagged , , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.