Latest posts

Page 2

Android – The new battleground for software vulnerabilities

With over 1 billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. In some cases, mobile phones pose a greater security risk than a desktop computer.

Continue reading

30 things to do to secure your network now!

Discover the top 30 things you can do without having to spend your entire IT budget, hire expensive consultants, or retool your network, to improve your network’s security.

Continue reading

Introduction to permissions

In this new mini-series we’re going to take a look at how to troubleshoot permissions. To start, let’s take a step back and discuss what permissions are, the various models, types of accounts that are affected, and the principle that should drive all permission-setting: least privilege.

Continue reading

Cyber-Insurance: Is it necessary? Should it be mandatory?

Should businesses consider buying cyber insurance or is it yet another insurance that’s unnecessary?

Continue reading

E-cigarettes chargers: not what they seem?

Hackers are purportedly bundling malware onboard with USB chargers so that, when users connect them to their computers to charge their e-cigarettes, they get more than a nicotine hit.

Continue reading

Employee Internet monitoring is really a process of discovery

Employee Internet monitoring is a discovery tool that enables the IT admin to properly manage and secure the network from the bad guys.

Continue reading

Cyber Monday’s coming; buyer, beware

As much of a fan of online shopping as I am, I’m also well aware of the dangers of this holiday shopping season for those who are looking for an online bargain. Phishing scams proliferate at this time of the year, with many of them offering popular products at incredibly low prices.

Continue reading

Third party patch and vulnerability roundup: November 2014

Adobe joined in by fixing eighteen vulnerabilities, but did so in a single patch. To the relief of IT admins everywhere, other major security vendors did not see fit to deluge us with more updates that usual.

Continue reading

http://shop.safely.blackfriday.com

If you intend on shopping online this year, keep your eyes open for the best bargains but watch out for those convincing scams. The URL in the title of this post does not take you to that site, but to this blog.

Continue reading

Give thanks for these 25 cool technologies

As we prepare for this year’s Thanksgiving holiday, we wanted to share our thoughts about some of the coolest technologies for which we are thankful.

Continue reading