Alan Sielbeck

Do You Copy? What Can Go Wrong with BCC

Do You Copy? What Can Go Wrong with BCC Try to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake […]

Read More

Are You Banking Online Safely?

Are You Banking Online Safely? Banks and credit card companies are making it easier for us to get money on the go. We can check account balances, pay bills, and transfer funds online. We no longer even have to go into a bank or visit an ATM to deposit checks. But are you banking online […]

Read More

Online Scheduling Solves Calendar Challenges

Online Scheduling Solves Calendar Challenges Setting up a meeting or training can be such a headache. You send an email or leave a voicemail with some suggested times, and the other participants respond with completely different times, often within the time window you identified as unavailable. Sigh! The possibilities go back and forth until finally […]

Read More

Security or Flexibility: Which Matters More?

Security or Flexibility: Which Matters More? Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you can’t have the best of both at once. While having absolute security or flexibility may sound good, neither is actually for the best. An entirely secure environment […]

Read More

What is a Firewall, and Why Does It Matter?

What is a Firewall, and Why Does It Matter? Hearing “firewall” in the context of computing can be confusing. How does a wall designed to mitigate the impact of a building fire apply to computers? Well, imagine the rescue team using heavy blasts of water to save the day. A hacker is as motivated to […]

Read More

7 Things You Need to Know About Ransomware

7 Things You Need to Know About Ransomware Ransomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business threat. #1 It Can Happen to You […]

Read More
1 18 19 20 28