Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Facebook Privacy a Concern, Part III

Facebook Privacy a Concern, Part III

Most of us have a love-hate relationship with social media. A particularly controversial platform we discuss quite a bit on our blog is Facebook. Privacy is a monumental concern in the digital age, so today we thought we would go over settings you might not even realize are enabled on your Facebook profile. 

Continue reading
0 Comment

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

Continue reading
0 Comment

Facebook Privacy a Concern, Part I

Facebook Privacy a Concern, Part I

Would you consider Facebook to be popular? It’s an interesting question. It’s like asking people if they think McDonalds is popular. These days Facebook is used by one in every four people in the world, yet there are very few people that will actively come to the social media giant’s defense, let alone admit to spending nearly half of their time online on the site (either via an Internet browser or via an app).

Continue reading
0 Comment

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

Continue reading
0 Comment

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Continue reading
0 Comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Hackers Malware Microsoft Efficiency Network Security Innovation Data Software Productivity User Tips Email Miscellaneous Smartphones Business Backup Mobile Devices communications Internet Hosted Solutions Hardware Workplace Tips Android Computer Productivity Smartphone Communication Ransomware Windows 10 VoIP Cybersecurity Business Management Small Business Managed IT Services Social Media Upgrade Outsourced IT Windows Browser IT Support Network Tech Term Mobile Device Save Money Business Continuity Holiday Apps Passwords Windows 10 IT Services Employer-Employee Relationship Bandwidth Microsoft Office Collaboration Users Office Facebook Managed IT Services Automation Cloud Computing Data Backup Internet of Things Chrome Gadgets IT Support Gmail Quick Tips Marketing Server Disaster Recovery Wireless Apple Router Alert Applications Data Recovery Password Wi-Fi Mobile Device Management Networking App Mobility Office Tips VPN Managed Service Health Remote Computing Managed Service Provider Computers Settings Retail Information Hacking Virtualization Business Intelligence Laptop Physical Security Remote Monitoring Website Operating System Excel Cybercrime Government Phishing Law Enforcement iPhone Access Control Data Management Analytics BYOD Application Saving Money Blockchain Patch Management Office 365 BDR Word Social Engineering Google Drive Workers Safety Recovery VoIP Paperless Office Environment Politics Humor Managed IT Service Mobile Computing Maintenance Compliance Data Breach Lithium-ion battery Artificial Intelligence Battery Entertainment Spam WiFi Telephone Systems Big Data Bring Your Own Device Biometrics Value Going Green History Twitter Virus Mouse PowerPoint Risk Management Customer Service Virtual Assistant Data Protection Internet Exlporer Windows 7 HIPAA How To Streaming Media Hybrid Cloud Fax Server The Internet of Things Tech Terms Remote Monitoring and Management Cost Management Printer Two-factor Authentication Sports RAM Net Neutrality Printer Server Information Technology Business Technology Employee-Employer Relationship eWaste Processor Managing Stress Vulnerability Scam Healthcare Company Culture Cortana User Error Telephony Smart Technology Best Practice Data Security G Suite Files Shortcut Tablet Medical IT Data storage End of Support Connectivity Voice over Internet Protocol Current Events Mobile Office Search Batteries Social Network Human Resources Telephone System Cleaning Hosted Solution Dark Web DDoS Robot Wireless Charging Hard Drives Tech Support IT solutions Tip of the week Payment Cards Customer Relationship Management Memory IT budget Plug-In Personal Information Remote Support Shadow IT Flexibility Hiring/Firing Budget Cryptocurrency Windows Server 2008 R2 Touchscreen Content Filtering Database Cabling Remote Control Botnet Computer Accessories Public Cloud Threats Certification Multi-Factor Authentication Consultant Movies IT Management Proactive IT SaaS Legal Staffing Touchpad Taskbar Programming Technology Tips Microsoft Office 365 User Tip Tactics Spam Blocking Managed IT Cameras Scams Training Holidays WannaCry Best Available Unified Communications File Sharing Time Management SharePoint Relocation National Security Backup and Disaster Recovery Authentication Telecommuting Internet Explorer Windows XP Email Management Encryption PDF Project Management Security Cameras Virtual Private Network Hard Drive Analyitcs Network Attached Storage Analysis User Security Video Games Chrome OS Updates SSD Authorization Millennials WIndows 7 Threat Unified Threat Management Licensing Notifications Insurance Wearables Co-Managed IT Hacker Processors Microsoft Teams Server Management Gadget Windows Media Player Black Market Inventory Troubleshooting Printing Webcam Travel YouTube Memes Science Spyware Machine Learning Worker Alerts Electronic Health Records Display Mobile Security Update File Management Paper Live Streaming NarrowBand IT Windows 8 HP Employees Virtual Reality Telecommute Reporting Sales Work/Life Balance Downtime Wearable Technology Benchmarks Social e-waste Outlook Managed Services Provider Voice over IP Phone System Ink Avoiding Downtime Multi-Factor Security Document Management User Cables Automobile WhatsApp Wireless Technology E-Commerce Hosted Desktop Solid State Drive Bloatware Data loss Knowledge People Running Cable Recycling Profitability Vendor eCommerce Digital News Uninterrupted Power Supply Chromecast Payment Hard Disk Drive Entrepreneur Staff GDPR Access Comparison disposal Copy Monitor Internet exploMicrosoft Social Networking Eliminating Downtime Online Shopping Downloads Edge Bluetooth Antivirus Techology instant Messaging Tablets Meetings Reputation Video Websites Storage Printers Specifications Paste Google Maps Advertising Bitcoin Wireless Internet Distribution Trends USB Amazon Education HaaS Vulnerabilities Customer OneNote Dongle Error Conferencing Spotify Distributed Denial of Service Private Cloud Help Desk Fleet Management Lead Generation A.I.