by Kwadwo Yeboah | May 3, 2018 | Computer, Security, Tips
Creating Electronic Signature (Adobe Acrobat Pro DC) Install Adobe Acrobat Pro DC Create or Open PDF document or form you want to sign Click on Tool Scroll down to Forms & Signature click on Fill & Sign Click on Sign icon, choose either Signature or Initials...
by Charles Hall | May 6, 2014 | Computer, Email & Internet, Security
Internet privacy is an especially hot topic these days, between surveillance programs, social network tracking, and the Heartbleed SSL bug. While websites are getting more secure, hackers themselves are also smarter than before. In 2005, 1.6 million identity theft...
by Charles Hall | May 3, 2014 | Email & Internet, Security
Email spam is defined as unsolicited mass email. Some spam is simply a nuisance, while other can contain offensive content, viruses, or links to phishing (fraudulent) websites. To protect your computer from spam, you should always take precautions including: Only open...
by IT Support Services | May 3, 2014 | Email & Internet, Security
Social media sites such as Facebook, LinkedIn, Google+, Instagram and Twitter have made it easy for people to communicate and share information. However, with the ability to post personal information about yourself and others, there are associated privacy concerns...
by Charles Hall | May 1, 2014 | Computer, Security
Leaving your computer on and unlocked when you are not in front of it is a security risk. If you leave the computer unattended, even if you are just going to the printer, you should lock your computer. It only takes a few extra seconds of your time and can protect...
by Charles Hall | May 1, 2014 | Email & Internet, Security
When your personal information is compromised, you can be a victim of identity theft. The information below covers identity theft and ways to protect yourself. What is Identity Theft? How can my identity be stolen? How can my personal information be used? How can I...