Pearl Technology Blog

Kick Flash Out of the Nest

Posted on 7/26/2016 by in Cyber Security Flash

Adobe Flash was a fantastic program in the 90s and early 2000s. It empowered users to create fantastic, original content. But like a child who refuses to leave their parents' house, Flash has overstayed its welcome.

read more..

Don't Cancel That Task—Install the Updates

Posted on 6/8/2016 by in System Updates Flash Java

You boot up your computer, and it happens again. A prompt pops up and asks you to install important system updates. Instead of clicking "remind me later," install those updates!

read more..

Throw Out Your Flimsy Passwords

Posted on 5/10/2016 by in Cyber Security Passwords

If you were building a new house, you wouldn't frame the walls with cardboard. You wouldn't install floors made out of Styrofoam and bubble wrap. If you use short, simple passwords, you're guarding your files and sensitive information with flimsy security.

read more..

5 Steps to Protect Your Mobile Devices

Posted on 2/18/2016 by in Cyber Security

Are you reading this blog from a smart phone or tablet? Do you check your personal or business email on a smart phone or tablet? If you answered "yes" to either of these questions, you should continue reading and take the necessary steps to ensure the security of your mobile devices.

read more..

Stay Safe While Surfing

Posted on 2/18/2016 by in Cyber Security

Think of your workplace as a beach. If you want to stay safe while surfing, you need to avoid sharks. These cunning beasts will wait until you're not paying attention, and then LOOK OUT! Cue the Jaws theme.

read more..