Some website drop down menus don’t work in Chrome

Recently I built a couple of new computers for a client. On one of the computers one and one website for that computer, the drop down menus would not work. The side fly out menus and click boxes worked just fine. All other computers in the office worked fine on that site.

After much scratching of the head, resetting Chrome, checking and double-checking of security exemptions in ESET, Malwarebytes and Super Anti-Spyware I was going nowhere. I emailed the support site of the problem web site. Their response is one I would have not thought of probably ever. Continue reading

Physical Security on a Budget – Securing Your Home Internet

This is a no cost solution to increasing your personal security, and we all like that four letter word “FREE”.

I was working on this as a subject not only for TWG, but also for a book that was written by Matt Canovi. The problem is I was on page 3 and just showing you how to log onto your router. That may be alright for a book however it is unacceptable for a blog. I will let you know when I either joint publish in the 2nd edition of Canovi’s book or have this published in depth elsewhere. Continue reading

Got Questions? Ask away!

Do you have a Technology. Computer, Server, Network or Security Question and don’t know who to ask? Jump on over to Ward Computers LinkedIn account, follow us and ask away! https://www.linkedin.com/company/ward-computers?trk=nmp_rec_act_company_name

Protecting your customers credit information

This is a guest article by Mercury Payment Processing, a company I represent.

The one comfort about large-scale data breaches is that there are often lessons that can be learned. In the case of Target’s breach, customer data was reportedly compromised by malware installed at the POS. Mercury’s Chief Information Security Officer Jim Maloney notes that merchants commonly overlook the following steps. While there is no guarantee your merchants can avoid all security risks, advising them on the following items can assist in mitigating security risks. Continue reading