When you are accessing sensitive information, such as with online banking, a very basic security measure is to remember to log out right after you finish. In most cases, however, the service will recommend that you also close your browser. The advice is very common but can be a slight annoyance. You will usually want […]
Why You Should Close Your Browser After Logging Out of a Service
Common Myths and Mistakes About WordPress: What You Need to Know
WordPress is an online content management system (CMS) that is used to power some of the most popular sites on the web. However, some businesses fear that WordPress has too many security problems, lack of disaster recovery and is difficult to administer. In reality, many of these risks are mitigated by simple maintenance and best […]
What is Bring Your Own Device in an Enterprise Setting?
The expansion of Information Technology (IT) into the business world has made it possible for employees to use smartphones, laptops and other mobile devices to stay connected to the enterprise. Businesses have two choices: issue devices owned by the company; or have the employees bring their own devices (BYOD). Predictions are that by 2014, 90 […]
Internet Privacy: Does It Still Exist?
At its inception, the Internet was seen as a haven for privacy seekers. The first news of someone getting fired for a picture he posted online was the shot across the bow for this idea. It became apparent that without the proper precautions, there was actually no privacy to be had. Instead, even a quick […]
How Computer Viruses Work
With Winter approaching, it’s time to start to thinking about how to protect yourself from the dreaded Winter flu. This year, I’d like you to include your computer in your contingency plan. What will you do in the event of a virus? How will you insulate yourself from whatever’s going around? Nobody likes being sick. […]
Data Security at Data Centers
Q: Today so much of our personal and professional data is housed not on our own computers but in large data centers run by third-party companies. What are some of the issues at play with data security and how do we know our data is safe? Company data stored within data centers is typically very […]
Which is Better: Closed or Open Source Systems?
There are few tech debates that have lasted longer without a satisfactory resolution than the debate over whether open or closed source software is ideal. Open-Source Programs Have More Developers Advocates of open source software point out how a multitude of collaborators can work together to improve the product. Many open-source programs have programmers creating […]
Recent Comments