Home    About Us    Services    Contact Us   Tips   Privacy   Clients    703.623.4454
HIPAA, client confidentiality, 
privacy, Info-Safety.com, info-safety, technology frustration remediation,
data recovery
Tips   on computer problems and internet and information security -- provided courtesy of Craig Herberg
Please be sure to check out our Tips Archive, Technology Blog and Privacy Blog.
  • How do I find Word 2003 commands in Word 2007?

  • How could unsecured wireless networks threaten public safety?
    • Criminals have long known that they could do nefarious deeds online in nearly complete anonymity, by using unsecured wireless networks owned by others. Online activity is readily traced to the owner of these unsecured wireless networks, but not to others who easily use them with laptops or other wireless devices. In this way, online pedophiles and identity thieves can go undetected. Additional information is available in the article, Wireless networks giving bad guys an edge. Please do your part by securing your wireless network.

  • What is pretexting and why the sudden interest in it?
    • Pretexting is a form of social engineering used to obtain confidential information to which the pretexter has no authorization from the victim. This practice has received a lot of press regarding an investigation of a Hewlett-Packard boardroom leak, when investigators apparently used pretexting to obtain the telephone records of Hewlett-Packard directors and employees, as well as reporters who covered the company. Pretexting is frequently used when other means of obtaining information, such as subpoena or search warrant, are unavailable or inconvenient. Strong demand, lucrative fees, and lax information handling practices keep pretexters in business. Any organization holding confidential or proprietary information should constantly review and update their information handling practices, and regularly conduct security awareness training sessions. Nobody wants their business to be known as the company that was tricked into improperly disclosing their customers' confidential information.

  • What security suite(s) do you recommend?
    • There is only one that we strongly recommend: Norton Internet Security (NIS) 2014. In our opionion, NIS has greatly improved it spam filter and malware prevention/removal to the point that it stands above all other security suites. NIS 2012 is much faster and less resource intensive than previous versions. It provides automatic updates and background scanning, and has current antivirus definitions for download on its web site. These fresh antivirus definitions can be copied to a thumb drive and used to update the definitions of a computer before reconnecting it to the internet.
Are you ready to let us help you with your computer and information security needs?
Client Comments

Craig has always solved any problem I presented. On time and within budget, he does what he says he will do.

Top qualities: Great Results, Personable, Expert


Jim Whelan, Principal
Proactive Corporation
Check Out Our Blog        Follow Us On Twitter!
Info-Safety, LLC, Fairfax, VA    Phone: 703.623.4454    Fax: 703.978.7547  Email: Craig@techwoes.com
Serving Alexandria, Arlington, Burke, Clifton, Fairfax, McLean, Great Falls, and Reston of Northern Virginia
Copyright 2017 © Info-Safety, LLC. All Rights Reserved.