Midsize Insider

All

Cecilia Harsch

Cecilia Harsch

Writer, Contributor
Connect with ceeharsch on Twitter Connect with ceeharsch on LinkedOn Connect with ceeharsch on Facebook
I have extensive computer knowledge from years of working with systems including performing multiple security updates for both my personal and business computers. I have experience with building computers, which gives me an intimate knowledge of what will and won’t work when new products are released.
I have written professionally since 2009 for various online publications. I have several years of experience in the home-improvement industry, focusing on gardening, and a background in group exercise instruction. I received my Certified Nurse’s Assistant license in 2004, and attended Tarrant County College where I studied English composition.

Articles by Cecilia Harsch

Dot What? ICANN to Release New Top-Level Domain Names

Since January 12, 2012, the Internet Corporation for Assigned Names and Numbers (ICANN) has accepted about 2,100 applications for new domains. Currently, the Web is made up of 22 top-level domains that everyone is familiar with, such as .com, .net, ...

IT Security Risks: The Difficulties IT Professionals Face

The recent release of InformationWeek's 2012 Strategic Security Survey shows more than 52-percent of IT departments' security teams have difficulty managing their security risks due to the complexities many face. Only focusing on meeting compliance requirements has most IT departments ...

DNSChanger Malware Could Disable Internet Connections for Some Users

If a banner has recently appeared at the top of Google's search page informing you of a possible computer virus infection, do not ignore it. Google is issuing the following statement to some users: "Your computer appears to be infected. ...

Bring Your Own Device to Work: The Undetected Dangers

With "bring your own device to work" becoming more and more popular with many companies and their employees, the chances of unintentional data leaks could begin to soar. Many applications, including iPhone's Siri, Dropbox, and Wi-Fi hotspot creators, could potentially ...

Cyber Laws: Where to Place Your Focus

In recent months, businesses have worried about the Stop Online Piracy Act (SOPA), the Protect IP Act (PIPA), the Anti-Counterfeiting Trade Agreement (ACTA), and most recentlu, the Cyber Intelligence Sharing and Protection Act (CISPA). Which, if any, of these proposed ...

Windows XP Demise Is Imminent as Microsoft Gears Up for Windows 8

Failing to start migrating from Windows XP to Windows 7 could place your midsize company behind the eight ball, costing your company thousands of dollars in support costs, according to PCWorld. Although Microsoft has campaigned for XP users to upgrade ...

Flame Malware: A Sleeping Giant

A complex malware known as Flame has reared its ugly head and has security research firms scratching their heads with wonder, trying to find the answers to several questions. Just how long this sleeping giant has been around is not ...

ISPs Helping Stop Content Theft

The battle over Internet piracy is not dead; it currently resides in Davy Jones' Locker. Both the Stop Online Piracy Act (SOPA) and the Protect Internet Protocol Act (PIPA) have been postponed indefinitely. But that has not stopped supporters of ...

Lessons on Forecasting Hacks from the RSA Conference

Scott Charney of Microsoft and Art Coviello of RSA opened the recent RSA conference by telling the audience members that they should no longer focus on attempting to defend the perimeter of cyber networks from potential hackers. Instead, they should ...

RSA Conference 2012: Mobile Media Making Traditional Security Antiquated

Keynote speakers addressing the audience at the RSA Conference 2012 warn IT executives that with changes in how data is used and accessed through cloud computing and mobile technology, they should begin to review how they secure their information. Rather ...

Potential Malware Attacks Lead to Control Loss on Mobile Devices

Mobile devices, such as Androids, new BlackBerry and iOS devices are currently susceptible to malware attacks that can take control of the mobile device, leaving the user helpless to retake the device. The vulnerability exists in the WebKit browser, the ...

Ultrabooks at CES: The Ultimate Cross Between Laptops and Tablets

The new trend in personal computing is everywhere at CES 2012, and with the line diminishing between the corporate and public consumer, small and midsize businesses (SMBs) can certainly benefit from some of the newest innovations.Companies from Acer to Toshiba ...

What SOPA Means and How It Affects Business on the Internet

When Congress convenes on January 17, 2012, one of the bills on the table for consideration and vote is the Stop Online Piracy Act (SOPA). While piracy, copyright infringement, and theft of important intellectual property should not go unpunished, this ...

« Previous1Next »