As computers and web-based software have become deeply integrated into our daily lives, so has a consciousness of security issues and the...
Continue reading →Computers Are Like Cars
Every so often I receive a call from my brother about his computer. You see, he has one of those "technically challenged" personalities. He can tear...
Continue reading →Download the Complete SEO Checklist for Beginners
This checklist includes tips, resources, and a checklist for designing a keyword strategy, improving your meta titles and descriptions, and working with on-page optimization. It is designed to get your blog and web content further up on the search engine results food chain!
Millions Vulnerable to New Hack Attack
Security firm Symantec and the Indiana University School of Informatics have discovered a new type of security threat that could leave up to 50...
Continue reading →Fraudulent Email
It has come to our attention that a handful of hosting customers recently received a fraudulent email message claiming to be from CWS. The subject...
Continue reading →Confidential Microsoft Email Posted Online
From the class action "Comes et al. v. Microsoft" suit, some very enlightening internal Microsoft emails have been made public. Emails to and from...
Continue reading →