Guest Author Jeff Brown is an IT industry veteran who started working in IT in 1994. He has a Bachelor of Science in Engineering Physics with a specialization in Electronics from Murray State University. He also holds several professional certifications including MCSE, CNE, and CLP. His extensive background in network support and planning, network security, data backup and recovery, tech support and hardware support has benefited numerous businesses in the Tri-State.
Recent Articles by Jeff
In the world of cyber-security, you cannot relax your guard, even for a moment. In mid-October 2014, discovery of a phishing scam aimed at obtaining sensitive user account credentials for a number of online services, including banking services, prompted a warning from US-CERT outlining the particulars of this scam. Known as Dyre or Dyreza, this banking malware is a phishing attempt to
What would spell disaster for your business? A powerful storm that takes out a large percentage of your equipment? A fire or flood that renders your facility unusable? Or would the larger disaster being wholly unprepared for a disaster and not having a plan for recovery in place? You may never need to use your disaster recovery plan, but that’s no excuse
You’re well into your morning routine – coffee in hand, checking your email, reading Facebook – when a security prompt pops up on your computer screen. You’ve never seen this sort of alert before, but right at the top, it says “Microsoft Security Essentials Alert.” Microsoft Security Essentials, or MSE, is Microsoft’s free anti-virus software available as a download on Microsoft’s website.
Suppose your Apple ID login led you to another screen that asked you to provide such information as your full name, your credit card number (including expiration date and verification code), date of birth, phone number, and your mother’s maiden name… would you provide that information? I suppose whether you’d share this sort of information would depend upon how trusting you are
If you haven’t heard by now, Microsoft is set to end support for the wildly popular XP operating system on April 8th. We’ve been talking about this end-of-life date here at Lieberman Technologies for a while now, and we’ve helped a number of businesses make the transition to a new operating system. If you’ve been putting off making the switch to a
The weather here in the Tri-State can be unpredictable. In fact, some are apt to say, “If you don’t like the weather here, wait five minutes – it’ll change.” At no time is this more accurate than during the warm weather months, where a thunderstorm can appear in the middle of a beautiful, sunny afternoon. Whether you fear or welcome a thunderstorm
If you’re one of the millions who are using mobile devices to take their work with them, then you know how important it is to have a professional email presence no matter what device you use. Part of that presence is a professional signature that lets you send messages from your phone or tablet with the same contact information as your desktop
Regardless of the layers of security in place, these layers of security are no match sometimes for the human factor. Even an employee of a technology company can be fooled into believing that an email attachment is genuine. And that’s just what happened. An email made it through our multiple layers of protection.
Ah, the joy and excitement of a new computer or cell phone. Shiny, new, pristine – a blank slate on which you will inscribe your personality and interests, on which you will create and communicate and learn and play, and on which you will put a lot of personal information. Processes will run faster, things will download more quickly, and you are
So, you got a new phone. And while you’re excited about your new gadget, with all of its fancy features and cool new case, you still have unfinished business with your old phone. Maybe you already have plans for your old phone. Maybe you’re going to pass it on to someone in your family, like your teen who’s been hinting at wanting