Tag Archives: password

compuer security

The Worst Passwords of 2015

We are still creating very weak passwords and getting hacked

If you are using any of these passwords, change them!

By Samara Lynn

Posted: Tags: , , , , , , , ,
How to Hide Stuff From Your Timeline

Timeline gives friends the ability to view your entire Facebook history. For this reason, we imagine the first thing most people will want to do is to "sanitize" their Timeline. The good news is, it's simple to hide what you don't want showing. When you see a post you'd like to nix, just hit the pencil icon at the top of the post and select "Hide from Timeline." This doesn't delete the content from your account, but it will keep it safe from prying eyes.

Why Asking For A Job Applicant’s Facebook Password Is Fair Game

Depending on the job, access to the social media communications of a potential hire may be in your company's best interest

Employers asking prospective hires for their Facebook password is a hot button topic but it’s…

By Alfred Edmond, Jr.

Posted: Tags: , , , , , , , , , , , , , , , , , , ,
This is the first installment of the Tech Insider. Each week we will investigate new technology tools that professionals and small business owners can use to increase productivity,  security, and stay innovative in this Web 2.0 world. These days business information is conducted, stored, and created online more than ever before. Some people go through great lengths to keep that data secure, doing everything from purchasing expensive anti virus software to avoiding the internet entirely, thereby missing out on innovative ways to stay competitive in a digital world. Keeping your data protected from corruption and your identity guarded from unauthorized use may require more common sense and less cryptic technology. Here are five things you need to do to decrease the likelihood that your proprietary business transactions won’t be violated.

Tech Insider: Five Tech Tools for Protecting Digital Data

Keep your files and online profiles secure from intrusion

Keeping your data protected from corruption and your identity guarded from unauthorized use may require…

By Marcia Wade Talbert

Posted: Tags: , , , , , , , , , ,