Mobile Safety: 5 Signs Your Phone Has Malware

Sarah Soliz Uncategorized

Viruses, trojans, and other types of malicious software, also known as malware, have become major security threats to smartphone users. Malware can leave your personal information and sensitive data vulnerable to hackers, while also causing damage that can make your phone inoperable. Learning how to spot the signs of a malware infection enables you to identify and remove the infection …

The shocking crime of child identity theft!

MD Monthly Uncategorized

  Has your toddler been getting preapproved credit card offers in the mail? IRS notices? Calls from collection agencies? If so, they’re the victim of child identity theft, a troubling crime in which the offender exploits your child’s social security number to commit fraud. Because a child’s SSN is a blank slate, the perpetrator can easily take out loans, apply …

How to Tell If That Email is Malicious

Sarah Soliz Uncategorized

The Internet can be a dangerous place. An old saying goes, “nothing is certain but death and taxes;” it could be amended for the 21st century by adding something like “and the fact that someone is trying to steal your online data.”  Whether they’re trying to sell it on the dark web, steal your identity, or for any other of …

Identity Theft 101 – Know Your Risks

Sarah Soliz Uncategorized

Identity theft has been on the rise in recent years, and becoming a victim can leave you fighting to recover your good name.  Recovering from identity theft can be both time consuming and expensive, so prevention is definitely the best approach.  Part of preventing identity theft is understanding where those risks lie and how to avoid them.  By knowing your …

Cryptominers: The New Tech Hazard in Town

Sarah Soliz Uncategorized

Cryptominers are software applications that mine cryptocurrencies such as Bitcoin. Malicious cryptominers exploit the processing power of unsecured networks and devices, consuming resources and placing additional strain on the systems they infect. Servers are a more popular target as they offer significant processing power. That said, cryptominers can infect all kinds of platforms, from desktops to networked systems and even …

How to Password Protect an OpenOffice Document

Sarah Soliz Uncategorized

Maintain the privacy and security of your OpenOffice document by equipping it with a password. Creating a password for your file can help ensure that only you and those you trust with the password will be able to access your information or any data you wish to remain confidential.  It is easy to password protect a document created with the …

Benefits of Using PDF Files

Sarah Soliz Uncategorized

Usually referred to by its acronym, the Portable Document Format has been around since 1993, and it is already well-established as the industry standard for fixed-layout documents across a multitude of different platforms. Being the most versatile and widely supported document format of all, PDF is used for everything from electronic books on e-reader devices to business presentations and much …

file pro- blog

Project Managing in Chaos: Document Management

egadmin Uncategorized

Managing project documentation demands a measure of discipline. Some team members may adhere to your structure and others may not do so. Not everyone shares the same respect for order. Follow these tips to encourage respect for your processes. First, mandate that all project details get documented, even just in notes. For example, you can create a SharePoint folder for …