Not sure which way to go? I have the answers…

Series Posts

The Cloud Adoption Movement: It’s already here – Is your business part of it?

Posted by on Mar 2, 2015

The Cloud Adoption Movement: It’s already here – Is your business part of it? First post in a new series about the advantages, risks and trends about moving your technology to the...

Read More

Computer Networks and Security

Cloud Security – an oxymoron or matter of policy?

Posted by on Jun 6, 2013

We all know what an oxymoron is, adopted phrases that seem to describe something but use two diametrically opposed words to convey them, e.g., A Fine Mess, A Little Big, A New...

Read More

Off The Cuff

The Cloud Adoption Movement: It’s already here – Is your business part of it?

Posted by on Mar 2, 2015

The Cloud Adoption Movement: It’s already here – Is your business part of it? First post in a new series about the advantages, risks and trends about moving your technology to the...

Read More

SingerLewak IT Perspectives

Malvertisements….Is it ever possible to avoid Malware?

Posted by on Dec 5, 2012

We all do our best to avoid advertisements in general, but with the evolution in online advertising, so comes the various ways hackers can use them to exploit our computers and the...

Read More

Recent Posts

Email Privacy Ruling – Employer Support

Email Privacy Ruling – Employer Support

Email Privacy Ruling Helps Employers with Security Concerns: a California Court of Appeals ruling clarifies that employees do not have enforceable privacy rights when using company email systems if the employer has a technology use policy that permits employer inspection of company email.  The Court reasoned that an electronic communication is not confidential,...

Banking Trojans – You won’t spot them until it’s too late.

Banking Trojans – You won’t spot them until it’s too late.

There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account… Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. The problem? The bad guys get as many attempts as they want and the bank only has to fail once before millions can be lost...

Practice Safe Emailing…Two sides

Practice Safe Emailing…Two sides

There are two topics to this series about email security, safety and best practices: 1 – Email Defense – When email goes wrong – how to protect yourself and your data from Spam and Spyware 2 – Sending the ‘killer’ email – What goes wrong when you ‘casually’ email the important stuff Email Defense – Unsolicited Commercial Email (UCE) is a...

BCP – Phase 6 – Implement and Test!

BCP – Phase 6 – Implement and Test!

Now a big sigh of relief!  You should be proud of your accomplishments!  Phase 6 is a celebration of 5 Phases of completion, 100’s of hours of time (likely), good money spent to protect your company and resume business when disaster strikes, and ultimately, be there for your customers in times of need. So what’s on tap for Phase 6?  Now, you just...

iOS 6: Tips, Tricks & Hidden Features

iOS 6: Tips, Tricks & Hidden Features

Every time Apple releases an OS X or iOS update we enjoy giving our readers quality walk-throughs, feature guides and my favorite — tips and tricks. Every Apple power user can attest that shortcuts and knowing many of the little things is a fantastic way to improve the user experience. I enjoy discovering as many as I can so that I feel well-versed as an iOS...

iOS 6 Release Date: Upgrade in Just Two Days – Here is What You Need to Know

iOS 6 Release Date: Upgrade in Just Two Days  –  Here is What You Need to Know

The iPhone 5 is already setting enormous records. Apple announced today that its preorders for the iPhone 5 topped 2 million in just the first 24 hours. we know the new iPhone is incredible, but folks are just as excited for the release of iOS 6. iOS 6 is Apple’s next mobile operating system and the new features are incredible and worth the download. Even...