The below articles are all published in BC advantage
Magazine and written and contributed by James
Summerlin
James Summerlin
at
Computer Security: The Third Law - Weak passwords trump strong security
Oh, yes, the dreaded password. Everyone hates dealing with passwords. You have a password/passcode for your ATM card, your house alarm (assuming you have one), your home computer, your work computer, the list just goes on and on. But therein is wh...
Read
Computer Security: The Second Law
Today, we are going to discuss the second immutable law which again should be pretty straight forward: If a bad guy has unrestricted physical access to your computer, then it's not your computer anymore.
...
Read
The 10 Immutable Laws of Computer Security - The First Law All medical office works should read Several years ago, Microsoft published what it called "The 10 Immutable Laws of Security." In this, the first installment of 10 articles, I will discuss each one and give examples of w...
Read
Two IT Situations to Avoid
As an IT consultant, one of the primary areas I see most business owners make poor decisions is Information Technology. What I find most amazing is that when I ask any given business owner a question such as how important good IT is to his or her bus...
Read