Have you ever visited a website and been greeted by a warning stating that the site is “Not Secure” or something similar? It is definitely off-putting to visitors when this happens. If you are a site owner and notice your site doing this, it is actually pretty easy to fix. All you need to do […]
Read More →Why You Need an SSL Certificate on Your Website
on July 19, 2019in Blog, Securitytags: encryption, Hacking, not secure, Security, ssl certificate

Windows 7 End of Life Approaches
on May 31, 2019in Blog, Security, Techtags: Security, Upgrade, Windows

The Windows 7 end of life date is quickly approaching. If you’re still behind, you should mark your calendar. Microsoft is ending extended support for this popular OS on January 14, 2020. After this date, they will stop patching security holes. Users who do not upgrade will be exposed to an ever increasing number of […]
Read More →Why Labor Unions Need Member Data Systems
on February 3, 2016in Web Developmenttags: AppleTreeUnionMediaWorks, centralized database, Data, database, governement, Labor Unions, Member Data Systems, member experience, Security, user friendly, web/mobile intergration

Many large organizations – specifically labor unions – struggle trying to keep their member data updated and accessible. Without a centralized database, the most up-to-date vital pieces of information often find their way into a collection of personal spreadsheets and sticky notes rather than somewhere useful. But what makes a centralized database somewhere useful in the […]
Read More →Good WordPress Administrator Names
on April 14, 2015in Blog, Security, Web Developmenttags: Administrator, Security, WordPress

Good WordPress Administrator Names WordPress lets you select your administrator name and by default, historically we have seen ‘admin’ come up as the most often used name. But using ‘admin’ as your username for WordPress is a potential security breach in the making. When hackers try to brute-force their way into a site, the first […]
Read More →Facebook Password Reset Scam!
on March 31, 2015in Blog, Securitytags: Facebook, facebook password scam, phishing, Security

Scam of the Day: Facebook Password Reset Scam The Email: Many of the phishing scams you may see in your mailbox are designed to alarm you into clicking, but look genuine enough at a glance so you don’t look that close. In a rush to fix things and at a cursory glance, you just click […]
Read More →EMV Chip and PIN Credit Cards
on February 18, 2015in Blog, Securitytags: Credit Cards, Fraud, Security

EMV Chip and PIN Credit Cards You may be receiving new credit cards this summer: the chip and PIN credit cards. Credit card terminals must be upgraded to the new technology, common in Europe, by October 1st or will be held liable for Credit Card fraud that happens in their establishment. The EMV chip and […]
Read More →My Computer Files are Being Held for Ransom!
on February 3, 2015in Securitytags: antivirus, banner ad virus, business locked files, cryptolocker, email virus, Internet Security, locked files, Malware, ransom for files, ransomware, Security

Ransomware Ransomware, often going by the specific name CryptoLocker or Cryptowall, is a form of malware that, when installed on your computer, encrypts your files and locks them with a key. It then demands a ransom in digital currency within a set amount of time, or the key will be deleted and the files will […]
Read More →Masque Attack
on December 30, 2014in Securitytags: Android, Apple, Security, Vulnerability

Masque Attack was a recent vulnerability involving Apple’s mobile operating system that would allow hackers to use web pages, text messages, and emails to trick people into downloading fake apps that disclose personal information. The concern is that fake apps resembling real apps such as banks or email program could replace genuine apps installed through […]
Read More →The Good and the Bad of Cloud Computing
on November 3, 2014in Blog, Security, Techtags: Cloud Computing, Dropbox, iCloud, Security, Tech

Cloud Computing Cloud computing seems inescapable. Phones and devices have cloud servers for files, any user can get free cloud backups for their own computers, and even federal and state governments are investing in cloud computing for their own data. But just what is it, and is it safe? What Is It? First, we had […]
Read More →Union Edge Tech Tips – October 29, 2014
on October 29, 2014in Blog, Security, Techtags: Security, Tech, The Union Edge

Verizon’s Cookies and Windows XP Hackers Verizon’s ‘Perma-Cookie’ Is a Privacy-Killing Machine Apparently Verizon tracks your internet use and there is no way to opt out of it. When surfing the internet using Verizon’s internet, a string of about 50 characters is added to the end of every URL you go to. Verizon calls this […]
Read More →Subscribe To Our E-Newsletter
Recent Articles
- The Great Phishing Scamdemic
Have you been noticing an abundance of suspicious looking emails flooding y…
- Serious Risks to Consider When Socializing Distantly
In today’s crazy world of staying home instead of visiting friends, we’ve a…
- Ten Tips on How to be Successful While Working From Home Dur
As a web developer of over 15 years, I’ve spent a lot of time working remot…
Recommended Posts
- Facebook Password Reset Scam!
- Why Is It Important To Know Who Owns Your Representative? One Example: Glass-Steagall
- Technology for Christmas
- UWUA Local 304
- Appletree E-Newsletter
- More than a Billion Passwords Stolen by Russian Gang
- 06/07/2019 E-Newsletter: Did Microsoft call? How to Make Strong Passwords
- Do I Need Alignable?
- Court Notice Scam
- Ways to Move Up in Search Engine Results
Upcoming Events
Social Media
- Chinese Government Holds Back Everyone’s Internet Freedom: A strong example of the problems this world... Chinese Government Holds Back Everyone’s Internet Freedom: A strong example of the problems this world faces with cyber censorship is what is going on in China. The government blocks many websit ...
- EU-US Privacy Shield Still Not Protecting Your Privacy: Still collecting bulk data, problems with the... EU-US Privacy Shield Still Not Protecting Your Privacy: Still collecting bulk data, problems with the judicial redress act, and no true protection for businesses
- Copyright and Social Media: This has become a gray area. Almost everyone is guilty of... Copyright and Social Media: This has become a gray area. Almost everyone is guilty of sharing something on social media, whether it be Facebook, Twitter, or Pinterest, that was copyrighted and not you ...
- How Your Devices are Tracking you and How to Stop it: Apple, Microsoft, and Android How Your Devices are Tracking you and How to Stop it: Apple, Microsoft, and Android
- Being Safe while Downloading Apps: With how many apps are downloaded it is always a... Being Safe while Downloading Apps: With how many apps are downloaded it is always a good idea to stay safe while downloading. You must take precautions, learn where to download, and do your research.
- Why Labor Unions Need Member Data System: Many large organizations – specifically labor unions –... Why Labor Unions Need Member Data System: Many large organizations – specifically labor unions – struggle trying to keep their member data updated and accessible. Without a centralized dat ...
- Is Your Phone Keeping You up at Night? Our electronics tend to distract us from... Is Your Phone Keeping You up at Night? Our electronics tend to distract us from going to bed, disrupt our sleep with constant sounds, and hurt our health with their blue light.
- All About Browsers: With so many browsers out there including: Google Chrome, Mozilla Firefox, Opera,... All About Browsers: With so many browsers out there including: Google Chrome, Mozilla Firefox, Opera, and Safari, you may have a hard time choosing one. While all of them have their ups and downs you ...
- Mobile Sub-Site versus Responsive Web Design: In 2016, if your website is not mobile ready... Mobile Sub-Site versus Responsive Web Design: In 2016, if your website is not mobile ready you need to change that today. Two main ways to make your site mobile is to either have a mobile sub-site or ...
- Do Not Track: Two members of congress filed a bill called the ‘Do Not Track... Do Not Track: Two members of congress filed a bill called the ‘Do Not Track Online Act of 2015’
- Website Tips for 2016: -Fresh Up to Date Modern Websites -Easy Navigation is Key -Website... Website Tips for 2016: -Fresh Up to Date Modern Websites -Easy Navigation is Key -Website Usability -Improve Your SEO -Social Media
- Where Technology and Christmas Come Together: Check out some of the ways you can enjoy... Where Technology and Christmas Come Together: Check out some of the ways you can enjoy the Christmas festive technology and how you can share some yourself.
- How to Stay Safe While Holiday Online Shopping: Learn where to shop online, how to... How to Stay Safe While Holiday Online Shopping: Learn where to shop online, how to be secure, and best practices to keep yourself safe.
- Newsletters in the Digital Age! In a digital age sending out electronic newsletters instead of... Newsletters in the Digital Age! In a digital age sending out electronic newsletters instead of paper newsletters has become much more popular. While deciding to do your newsletter does have its downsi ...
- Safe Harbor Ruled Invalid, How it Affects You: The European Union and the Unites States... Safe Harbor Ruled Invalid, How it Affects You: The European Union and the Unites States will be meeting on December 17th to create a new agreement for the Safe Harbor. They plan to conclude this agree ...
-
- The Internet Helps in a Crisis: Everyone has heard about the recent Paris Attacks on... The Internet Helps in a Crisis: Everyone has heard about the recent Paris Attacks on November 13th many dead, wounded, or stranded. Many companies have made use of the Internet in a time of crisis to ...
- Advertising Online for your Business: Advertising your business online can boost your sales and website... Advertising Online for your Business: Advertising your business online can boost your sales and website traffic if done the correct way. There are many different ways and places to advertise online
- Using Analytics for Your Business: Analytics is data analysis that usual involves taking past data... Using Analytics for Your Business: Analytics is data analysis that usual involves taking past data to find trends and effects or decisions or events. It can also compare old data with new data using a ...
- The NSA and Online Privacy: Many studies, cases, and documents show that the NSA is... The NSA and Online Privacy: Many studies, cases, and documents show that the NSA is spying on American citizens using online surveillance. As an American, this invades our Freedom of Speech and our Ri ...
- BrandiGirlBlog published this great chart of color and size conversions between inches and pixels, etc.... BrandiGirlBlog published this great chart of color and size conversions between inches and pixels, etc. MonaRaeBeads.etsy.com ★ || CHARACTER DESIGN REFERENCES | キャラク& ...
- Learn About Scam Emails: Scam emails are a very popular and while most email services... Learn About Scam Emails: Scam emails are a very popular and while most email services have a spam sorting feature built in, not all will be sorted properly. Scams can look like they came from a friend ...
- Google Event, the Good and Bad: Google held their press event on Tuesday, September 19th... Google Event, the Good and Bad: Google held their press event on Tuesday, September 19th in San Francisco announcing many new products such as the Nexus 6P and 5X, the new Chromecast 2, Chromecast Aud ...
- Prevent Malware on your Smartphone: Different malware includes adware, bug, spyware, Trojan horse, virus, and... Prevent Malware on your Smartphone: Different malware includes adware, bug, spyware, Trojan horse, virus, and many more (Learn more about Malware types ) There are some signs that your phone is being ...