Entries by admin

Small-business tech security can be had at lower costs

Nasty things began happening at Jones & Wenner not long after the Fairlawn, Ohio, insurance brokerage decided it had grown large enough to handle company e-mail in-house. The free Web mail services the firm’s 20 employees had used to conduct business no longer cut it. So the company purchased a Microsoft Outlook Exchange e-mail server. […]

How secure are you online? The checklist

Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we’re breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we’ll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.

Hackers leak 1 million Apple device IDs

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI.

EC-Council TakeDownCon Online

Online TakeDownCon Live August 15 and afterward on demand Highlighted Presentations: Bring Your Own Destruction Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology August 21, 2012 9:00 am PT, 12:00 pm ET BYOD is the word of the day.  Everyone is jumping at the chance to buy a solution that solves the BYOD issues. […]

2012 Washington D.C. Tech-Security Conference

This year, the Washington D.C. Tech-Security Conference will bring together private industry, government decision makers and technical enthusiasts in the fields of Information & Network Security. This unique conference format will provide several interactive high intensity sessions as well as tremendous networking opportunities.