A sense of belonging, a sense of community and for businesspeople, a touchpoint for customer service and the ability to market to specific demographics are among social media’s benefits. And like every technology, social media – by which I mean websites that offer sharing tools that allow people to interact (e.g. Instagram, Twitter, SnapChat, Facebook, YouTube) – have their drawbacks.
Author Archive for: Guest Author
You are here: Home / Guest Author
About Guest Author
This author has yet to write their bio.Meanwhile lets just say that we are proud Guest Author contributed a whooping 13 entries.
Entries by Guest Author
It’s easier than you think for organizations and their leaders to overlook cybersecurity. Unfortunately, the nature of the threat means some of the biggest worries for your organization might actually be out in plain sight. Here are five cybersecurity risks that are regularly overlooked. Inconsistent or Nonspecific Cybersecurity Training. In many cases, people are the […]
How many times have you answered your phone only to hear a recorded message instead of a live person? It’s annoying, it’s illegal and it’s known as a robocall. “The FTC has seen a significant increase in the number of illegal robocalls because internet-powered phone systems have made it inexpensive and easy for scammers to […]
The following information was posted by the FTC on their website. Scam artists buy and sell “sucker lists” with the names of people who already have lost money to fraudulent promotions. These crooks may call you promising to recover the money you lost or the prize or merchandise you never received — for a fee […]
“Messages telling you to install and update security software for your computer seem to be everywhere. So you might be tempted by an offer of a “free security scan,” especially when faced with a pop-up, an email, or an ad that claims “malicious software” has already been found on your machine. Unfortunately, it’s likely that […]
There are scammers who will call and claim to be a computer tech associated with well-known companies like Microsoft or Apple. Other scammers send pop-up messages that warn about computer problems. They say they’ve detected viruses or other malware on your computer. They claim to be ‘tech support’ and will ask you to give them […]
In the past several months, Android security issues have become part of techie news. Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they’re having more success than ever before. There are some things you can do to tighten up your Android security, and most of the features […]
Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication which should give users more protection against phishing and may reduce the need for passwords. These internet browsers are expected to allow users to sign into online profiles through facial recognition, fingerprint scanners and voice authentication. Online biometric authentication through these browsers […]
The Company: Worcester Regional Transit Authority The Worcester Regional Transit Authority (WRTA) services the City of Worcester and 36 surrounding towns with a bus fleet that includes all-electric buses and many diesel-electric hybrid buses. As the second-largest regional transit authority in Massachusetts, WRTA features a real-time bus arrival information system that includes the latest advancements […]
The Company: Leaktite Corporation Leaktite Corporation manufactures and distributes metal, plastic and paper containers, buckets, pails and trays for a wide variety of industrial, commercial and consumer applications. From its establishment in 1945, the company has achieved solid growth based on experience and the flexibility to move with the times. Leaktite supports product development with […]