Archive for author: webadmin

Multi-Factor Authentication, User, Login, Cybersecurity privacy protect data. internet network security technology. Encrypted data. Personal online privacy. Cyber hacker threat.

Tech Corner October 2022 | Understanding Multifactor Authentication

Understanding Multifactor Authentication     As cybersecurity incidents are on a continued rise, the need to understand and protect your online accounts from wrongful usage is crucially important.  The ala...

Happy schoolgirl and her classmates e-learning over laptops during a class in the classroom.

Tech Corner September 2022 | Monitoring Kids Chromebook Usage

Monitoring Kids Chromebook Usage     It’s hard to believe that summer has come and gone, and a new school year is underway. With the increase in remote education and technology demands over the last two ye...

Furious man angry about bad news online or pc software failure, mad helpless office worker having problem with broken laptop, stressed student hates computer crash, user indignant about data loss

Tech Corner August 2022 | How To Prepare for Computer Crashes

  How to prepare for computer crashes   Most discussions about loss of data or computers being inoperable lately are related to viruses, malware, ransomware, or cyber events.  However, remember that c...

Sad businessman looking at computer monitor with inscription You have been hacked. Cybercrime concept.

Tech Corner July 2022 | Cyber Security Tips for Seniors

Tech Corner: July 2022 Topic:  Cybersecurity Tips for Seniors     Each year, statistics reveal that cyber threats and criminals steal approximately $40 billion from seniors in cyber-crimes.  They work...

A mother looks on from the kitchen as two pre-teen boys use a smartphone in the living room.  She is out of focus but it is clear to see her sense of discomfort with what they are doing on the internet.

Tech Corner May 2022 | Social Media Safety for Kids

Social Media Safety for Kids   The Internet and social media are a digital life at our children’s fingertips. In fact, surveys show that 90% of kids and teens ages 13-17 use social media, and roughly 50% a...

internet security and data protection concept, blockchain and cybersecurity

Tech Corner April 2022 | Online Security Tips

Tech Corner: April 2022 Topic:  Online Security Tips   ‘Tis The Season….  No, not the Christmas Season, but the season for major increase in cyber security threats.  It’s no surprise that an increase in cy...


Tech Corner March 2022 | The Chip Shortage

Patience is a Virtue: The Chip Shortage     By now you’ve certainly heard of or come across the topic of the worldwide chip shortage, but maybe don’t necessarily understand what it means or how it bec...

Man wearing VR Glasses

Tech Corner February 2022 | What is the Metaverse?

Tech Corner: February 2022 Topic: What is the Metaverse?   Whether you are in the tech community or not, this topic and new buzz word is circling quickly, so we thought it was prudent to provide an introdu...

Close up of a woman using a computer

Tech Corner January 2022 | Tips for Safe Surfing on the Web

Happy New Year and welcome back to the Tech Corner.  Hopefully Santa brought you everything that you asked for, including a new computer!  This Tech Corner will provide tips for keeping your system safe and cle...

Concept. 3D render

Tech Corner December 2021 | What is Bitcoin?

Tech Corner: December 2021 Topic: What is Bitcoin?   By now, you’ve certainly heard someone use the buzz word “bitcoin” or “cryptocurrency.” Although, do you really understand what it is, what it means, or...