Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

06Sep2012

Lowdown on Hijacked Email

Emailing information is fast and convenient. We do it often without a second thought – and that discarded second thought can come back as a painful reminder that you need to be careful to prevent your email address from being hijacked. There really isn’t a lot you can do about hiding your email address or
  • 6 Sep, 2012
  • Norman Rosenthal
  • 0 Comments
  • hijacked email, spoofing,
Read more
06Sep2012

Credit Cards: Small Businesses are Big Targets

Accepting credit cards is a way of life for many small businesses, and most owners don’t give a second thought to extra layers of data security. After all, what can a small mom-and-pop store have that would be attractive to hackers? Well, as it turns out, small businesses are big targets because they’re pretty easy
  • 6 Sep, 2012
  • Norman Rosenthal
  • 0 Comments
  • credit cards, data security, risk management, small business,
Read more
06Sep2012

The Device Trap

When I was a kid in New Jersey, we were careful about having long telephone conversations with people in California because it was very expensive. Last summer, my wife and I thought nothing about calling our kids in New Jersey from our vacation in Australia because an Internet phone call was free.  We associate the
  • 6 Sep, 2012
  • Norman Rosenthal
  • 0 Comments
Read more