Online Payments & Security
The danger of online payment is the same as the one in the shop. Theft of money, copy of your credit card credential, theft of your codes …, the use of common sense is the…
>>>The danger of online payment is the same as the one in the shop. Theft of money, copy of your credit card credential, theft of your codes …, the use of common sense is the…
>>>When we speak of “Cloud” we think first of data storage spaces, such as Dropbox, GoogleDrive or OneDrive. We picture this as personal lockers locked. But it’s much more than that …
>>>Social networks have become very popular and there are plenty of them. Is it just a fashion or serious? I don’t know. Will they still exist in 10 years, I don’t know either. There is…
>>>We have previously seen some options to isolate your mailbox from the rest of your system. We will now undertake the same work with your mobile phone. Today, for many, the phone has become indispensable.…
>>>The communications system (s) are more and more friendly to use. The barriers fall between the different applications. Everything becomes permanently connected. More synergies are found making these systems almost indispensable or at least they…
>>>In the chapter about the 1st of the 3 pillars of my IT security I told you about the technical precautions to be taken like: the Firewall, the Antivirus, the Passwords, the Updates, the Windows…
>>>We have seen so far different approaches to secure access to your private space. But now, by going on the Internet, you open a door in this protected environment. So what can we do to…
>>>Regularly updating your system and software is beneficial, but it is also a danger. Below I explain why. All Updates are not alike and do not always follow the same goal. This is why I…
>>>Whether you are alone or many to share computer, it is a good idea to create a clear separation between the daily use and technical management of your device.
>>>