Tech Zone

http://shop.safely.blackfriday.com

If you intend on shopping online this year, keep your eyes open for the best bargains but watch out for those convincing scams. The URL in the title of this post does not take you to that site, but to this blog.

Continue reading

Give thanks for these 25 cool technologies

As we prepare for this year’s Thanksgiving holiday, we wanted to share our thoughts about some of the coolest technologies for which we are thankful.

Continue reading

Security 101 – Algorithms

In this post we take a look at the encryption algorithms that are in common use today and those that are no longer in vogue. We’ll also see how encryption can be used both to obscure and to validate data and when you want to use one type of algorithm over another.

Continue reading

What does USB stand for, Universal Security Breach?

Researchers have come up with new modes of attack and all the user has to do is plug in the USB device.

Continue reading

Why corporate security is needed beyond corporate walls

Laptops are a great target for malicious attackers and some really sophisticated methods are being used. Business laptops should be properly secured and that they are checked for vulnerabilities and missing patches regularly.

Continue reading

Security 101 – Encryption terminology

One of the first things that comes to mind when talking about security is encryption. Encryption can be used to provide confidentiality and integrity, which are two of the three main tenets behind security. To be sure that you are familiar with the concepts we will be covering in upcoming articles, here is a primer on encryption terminology.

Continue reading

IT Confidential: A Day in the Life

As cloud computing slowly but persistently permeates all of IT, what will a day in the life of the IT pro of tomorrow be like?

Continue reading

Trick or treat – the 21 scariest things on your network

With Halloween just around the corner, are you prepared for tricks, or hoping only for treats. There’s an entire host of evil out there. How many of these ghastly things might be found on your network?

Continue reading

How to troubleshoot Exchange ActiveSync connections

Ensuring that Exchange ActiveSync is working properly on both your Exchange infrastructure and your users’ myriad mobile devices is one of the most important things you can do. Usually, EAS works perfectly well, so this is not a problem for you. But occasionally, things do fail, so knowing what to look at and how to troubleshoot are critical skills. This article should help get you started.

Continue reading

How much do you trust technology?

Machines are analyzing the data and making many of the decisions that used to be the province of human beings. In some cases, this has had very positive results; in others, not so much.

Continue reading

Find us on Facebook

Follow us on Twitter