Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Small-business tech security can be had at lower costs

Nasty things began happening at Jones & Wenner not long after the Fairlawn, Ohio, insurance brokerage decided it had grown large enough to handle company e-mail in-house. The free Web mail services the firm’s 20 employees had used to conduct business no longer cut it. So the company purchased a Microsoft Outlook Exchange e-mail server. […]

How secure are you online? The checklist

Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we’re breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we’ll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.

Small-business tech security can be had at lower costs

Nasty things began happening at Jones & Wenner not long after the Fairlawn, Ohio, insurance brokerage decided it had grown large enough to handle company e-mail in-house. The free Web mail services the firm’s 20 employees had used to conduct business no longer cut it. So the company purchased a Microsoft Outlook Exchange e-mail server. […]

How secure are you online? The checklist

Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we’re breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we’ll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.