Blogger: Administrator
Administrator has not set his/her biography yet.

iPhone 5

The new iPhone has set a record sales cycle again, 2 million units in 24 hours!  But you may be asking yourself if the upgrade is worth it.  If you have a 3gs or 4 the answer is a resounding YES! But if like many you are on the 4s this can be a confusing question.  Some points and counter points to upgrading are....

Continue reading

Changing Your Email Habits

Recently I read an amazing article about the management of email and how it can completely monopolize your work day if not careful.  I can’t say that I have strictly adhered to the direction in the article but I have attempted to change my habits.  Part of the study discussed how a single email you receive can completely divert your attention from the task you were doing for as long as 15 minutes, even if you are just sending a quick response.  By the time you come back to the task you have to figure out where you left off, what you were doing and re-engage.  If this happens during your whole day you can’t accomplish anything.  So here are some tips I picked up that I thought were excellent.

Continue reading

What PDA Should I Get?

Here’s a question I hear regularly “So what PDA should I get and can I connect it to our network?”  I can offer that I’ve seen just about every variation of PDA over the last 10 years from the first Blackberry’s, Treo’s, Motorola Q’s up to the most current iPhones, Droids, Windows 7 phones and the latest Blackberry’s.  They have come a long way since the first devices and are easier than ever to integrate with your corporate networks.   M3’s staff uses a combination of Blackberry’s and Droid based phones.  The iPhones, Droid’s and Windows 7 phones are by far the easiest to integrate into a corporate network because of their built in synchronization options.  They all work well with the wireless carriers in the area and have both cellular wireless connectivity (3G or 4G) and WiFi connectivity (Wireless such that you would use with your laptop to connect at home or in the office).  Each phone has their benefits and really falls on the person using it and the comfort level they have with the interface.

Continue reading

Tools to Combat Security Threats

It seems that every month we uncover another tool to help us combat security threats.  My last post I discussed the various types of security threats and what they can do.  So how do you combat and rid your systems of these infections?  There are hundreds of anti-virus, anti-malware, anti-rootkit, etc. products both for sale and for free.  Lets talk about a few of them both paid and free.  A couple caveats, the free ones are typically not as good as the for pay ones but can be very useful.  Also, be weary of any products from software vendors you don’t recognize, many of these products are actually the bad stuff.

Continue reading

Different Kinds of Security Threats

In my previous post I discussed the difficulties our company faces protecting our clients from security threats on the Internet.  To dive into this further I want to discuss the differences between different kinds of security threats.  First off, all security threats were written with bad intentions.  Viruses, malware, adware, rootkits, trojans, etc. were written by a malicious software developer for some personal or corporate gain.  For instance, many of these programs are written to try and get you to divulge personal information (social security numbers, addresses, phones numbers) or financial information (credit card or bank account numbers).  In other instances the software programmer wrote the program to try and cause harm to a corporation.  This has been scene with a common infection that caused websites and personal computers to attack corporate websites like Yahoo.com or Google.com.  The computers were set up as “bots” to send erroneous website requests to these major company’s in the hopes that the servers hosting the websites would be overwhelmed with requests and crash.

Continue reading

Fighting Spyware

On a regular basis I find myself fighting spyware on a client’s machine.  I keep asking myself is there a better way to protect against this?  Should I use a different antivirus or antispyware vendor?  Should we instate policies to prevent people from browsing the web and only allow them to go to very specific sites?

Continue reading

Recent Articles

Tuesday, 18 February 2014
Wednesday, 17 July 2013
Wednesday, 12 June 2013
Monday, 20 May 2013
Thursday, 25 April 2013
Monday, 21 January 2013
Thursday, 03 January 2013
Monday, 26 November 2012
Monday, 05 November 2012
Monday, 22 October 2012
Tuesday, 09 October 2012
Wednesday, 19 September 2012
Wednesday, 19 September 2012
Monday, 10 September 2012
Wednesday, 05 September 2012
Friday, 17 August 2012
Monday, 30 July 2012
Wednesday, 25 July 2012
Friday, 20 July 2012
Friday, 06 July 2012
Sunday, 24 June 2012
Monday, 18 June 2012
Tuesday, 05 June 2012
Monday, 21 May 2012
Monday, 14 May 2012
Monday, 30 April 2012
Tuesday, 24 April 2012
Saturday, 14 April 2012
Monday, 09 April 2012
Monday, 02 April 2012
Wednesday, 02 March 2011
Saturday, 12 February 2011
Wednesday, 02 February 2011
Friday, 28 January 2011
Friday, 21 January 2011
Friday, 14 January 2011

M3 Blog Categories

12 post(s)
4 post(s)
3 post(s)
17 post(s)