Profile cover photo
Profile photo
Velocity Computer Tech
3 followers
3 followers
About
Velocity Computer Tech's posts

Post has attachment
Yoga for the Tech Savvy
Photo

Post has attachment
We can help back up your data! Don't wait until it's too late! Contact us at (816) 875-TECH (8324)
#DataBackup
Photo

Post has attachment
Internet problems? We can help! #Internet Optimization
http://bit.ly/15B6TLf
Photo

Post has attachment
Computer slow? We can speed it up with #Tune-up & #Optimization Service. Give us a call or stop by with your computer. http://bit.ly/15B6TLf #computerslow
Photo

Post has attachment
Photo

Post has attachment
Don't let this happen to you! We can prevent you from losing all of your important data! Let us assist you with Hard Drive Data Recovery & Data Backup. Call us or drop off your computer today! http://bit.ly/15B6TLf #datarecovery #databackup
Photo

Post has attachment
Velocity offers virus protection that will let you know if your have security risks due to your Facebook settings!

E-Commerce Security Tip #6 -
Protect your online identity on the social front - Online purchasing is getting more and more social, with 50 percent of Web sales projected to occur via social media by 2015. Each time you join a new site through the "Login with Facebook" option, you're extending your online identity further. In fact, an abundance of sites will first prompt you to become a member not by email, but by connecting a social media account. When you then go on to transact on these third-party sites while logged in via Facebook or Twitter, you are essentially connecting the account with a credit card.
Is it a direct connection? Technically, no. Will it be used to shape your online identity? Absolutely. Your social media presence defines your digital footprint to the point where companies are looking to use your social media identity to combat online payment fraud and your social signals to tackle identity fraud in the near future.
Once you realize the majority of your online activity is interconnected, you can better defend yourself from making thoughtless choices that may endanger your data. Just like you shouldn't post something you don't want your employer to see on Facebook, you also shouldn't post anything you don't want a hacker to see, like a picture of your driver's license or passport, anything with a home address and, any snapshots that include a visible credit card or credit card number. It's also smart to choose passwords, pass phrases, and answers to security questions that cannot be derived from your online social presence.
Photo

Post has attachment
E-Commerce Security Tip #5 -
Use virtual credit cards as needed - Many financial institutions and credit card companies offer virtual credit cards (VCC) for certain online purchases. Virtual credit cards are temporary payment cards, either as physical plastic or in the form of a generated credit card number, which are separate from your bank information. This type of disposable credit card payment method contains a pre-set spending amount, has a shorter-than-usual expiration date, and is equivalent to a regular credit card for most payments purposes.
Virtual credit card payments are usually charged to your credit or debit card, rather than directly to your bank account, essentially offering an additional layer of protection. When you pay with a virtual credit card, your banking information remains separate from your individual purchase, thus ensuring if the card number is stolen, hackers cannot access your accounts or re-use the card fraudulently.
Photo

What is your preference, MAC or PC? Why?

Post has attachment
E-Commerce Security Tip #4
QUESTION EVERY SITE YOU GET ON One of the easiest ways to avoid online scams is to ensure you transact with legitimate sites. Beyond checking the URL for validity, a simple two-step process will help ensure the site is authentic. First, check that the site you plan to make a purchase on has a valid "About us" or "Contact us" page with contact information listed. Second, confirm the company has some type of social media presence.
Google the site's domain; its Twitter, Facebook and/or LinkedIn accounts should be present on the first few result pages. Genuine companies will have active social accounts and an online conversation in place with consumers, whereas fraudulent sites are likely to show Google results of consumer complaints, BBB warnings, or other scam indications.
Photo
Wait while more posts are being loaded