DocuCrunch.com » In this week’s e-newsletter

Symantec, Snoop Dogg team up to sell cybersecurity


September 7, 2010 by Sam Narisi

What’s it take to sell the kind of security software that’ll keep a computer safe? A good rap hook might do the trick. At least that’s the thinking over at Symantec, maker of Norton anti-virus software. More…

Experts warn: Most passwords are too short


September 3, 2010 by Sam Narisi

As computers get more powerful, so do password cracking tools. Many businesses and users haven’t been keeping up. More…

Digital phones: Is someone listening in?


September 2, 2010 by Steve Hannaford

Internet-based telephony (known as VOIP, or voice over Internet Protocol) is being adopted in businesses across the country, thanks to its promise of lower monthly costs and easier administration, along with a set of productive software features (such as FollowMe call routing, voice mail e-mailing and phone number portability). More…

How to talk to execs about security funding


September 1, 2010 by Sam Narisi

Keeping company networks secure is a big part of IT’s job. But these days, departments often don’t get the funding they need to stay on top of the latest threats. More…

25% of malware spread by this overlooked threat


August 31, 2010 by Sam Narisi

It’s not just malicious websites and e-mail attachments anymore. These days, cybercriminals are using another method to spread malware: More…

Brother app supports printing from mobile devices


August 31, 2010 by Sam Narisi

As smartphones and other mobile devices become more popular, more vendors are looking for ways to let users print on the go. More…

Lack of policies leads to paper waste


August 30, 2010 by Sam Narisi

Recent research shows that, despite increased environmental awareness, most employees aren’t ready to change their printing habits. More…

Case study: Digital pens cut down on paperwork


August 27, 2010 by Sam Narisi

Businesses that need employees to report data on the go often turn to smartphones, tablet PCs or other mobile computing devices. But there’s another tool that may be a better fit: More…

Lexmark sues 24 cartridge makers


August 26, 2010 by Sam Narisi

It could soon get harder for businesses and consumers to find low-priced, third-party ink and toner cartridges. More…

Intel buys McAfee: Will it dominate the Cloud?


August 25, 2010 by Steve Hannaford

Chipmaker Intel just snapped up major security software company McAfee, in a $7.68 billion deal. More…

New Web 2.0 threat: Add-ons and widgets


August 24, 2010 by Steve Hannaford

Employees aren’t getting the IT security messages. That’s the conclusion of a recent study of 2,100+ data security administrators from five countries conducted by the Ponemon Institute for Check Point software. More…

Help for mobile printing woes


August 24, 2010 by Steve Hannaford

You make some last minute changes to a spreadsheet or a presentation in the airplane or the hotel room. The problem: How do you print out a new revised copy? More…

Portable protection for road warriors


August 23, 2010 by Steve Hannaford

With so much work being done now by telecommuters and laptop-toting road warriors, data security problems have become all the more complicated. There’s a real need for remote workers to log into their company’s data center without opening new opportunities for data loss and malicious attacks. More…

New tool helps convert handwritten docs to digital files


August 20, 2010 by Steve Hannaford

OCR (optical character recognition) has become a surprisingly reliable tool for all kinds of businesses. Converting printed text into a digitally readable and searchable format is now commonplace enough to be included in even the least expensive scanners and multifunctionals. More…

Security beyond printers and copiers


August 19, 2010 by Sam Narisi

While security issues involving printers and copiers have gotten a lot of press lately, there are other devices companies would be wise to consider when revamping security plans. More…

Sex scandal lands Hewlett-Packard in turmoil


August 18, 2010 by Steve Hannaford

Hewlett-Packard’s latest woes have nothing to do with its technology prowess or market position. But a shakeup in the world’s largest printer manufacturer and PC maker certainly has caught the attention of the industry. More…

Security firm: The bad guys are winning


August 17, 2010 by Sam Narisi

Folks in charge of protecting IT security will often vent that they’re fighting a losing battle. But when a company that sells security products says it, it means a lot. More…

New drives enhance copier-MFP security


August 17, 2010 by Steve Hannaford

Disks on multifunctionals have been in the news lately. It’s become clear that data thieves can target drives on used computers, which often contain data from caching printed pages. More…

Study: Antivirus programs can’t be trusted


August 16, 2010 by Sam Narisi

All businesses use antivirus software to keep malicious programs off the company network. But a study shows why those applications should just be one part of an over-all security strategy. More…

5 tools for browser security testing


August 13, 2010 by Sam Narisi

A secure browser is often the first line of defense for a company’s network security. Here are some tools that can help find and fix security holes. More…

Latest security threat: Vacationing employees


August 12, 2010 by Sam Narisi

Can users in your company securely access data from outside the office? Secure or not, they’re going to try. More…

Use less ink by cleaning up web printouts


August 12, 2010 by Sam Narisi

Here’s a way you and your company’s users can use less ink when printing from websites. More…

Are firewalls making your network less secure?


August 10, 2010 by Sam Narisi

Security infrastructure technologies, like firewalls, antivirus apps and management consoles, do a lot to keep hackers off of corporate networks — but they also open up their own holes for attackers. More…

A small printer may mean a big plus for food safety


August 10, 2010 by Steve Hannaford

Over the past few years, we’ve seen a number of diseases caused by contamination of the food supply, whether it be green onions, melons, or lettuce. Those problems may now be easier to control with some help from an unlikely hero: More…

The risks of saving too much data


August 9, 2010 by Steve Hannaford

Saving data can go too far, according to the results of a recent survey from security software company Symantec. More…

Smartphone malware can auto-dial pricey calls


August 6, 2010 by Sam Narisi

As smartphones become more common, so do viruses that infect them. Take this recent attack that gives criminals an easy way to steal from mobile users.  More…

Survey: Paperless push not working


August 5, 2010 by Sam Narisi

Trying to find ways to reduce your office’s paper use? Don’t look across the pond for help. More…

Toner could be made from plastic waste


August 4, 2010 by Sam Narisi

Some new technology could soon make printing more environmentally friendly. More…

5 add-ons to boost browser security


August 3, 2010 by Staff

The folks at Google have touted Chrome as the safest web browser available. But determined hackers are always finding new ways to access your company’s sensitive information. More…

Remote access for employees — and for data thieves


August 3, 2010 by Steve Hannaford

New technology that lets users connect to the company network from remote locations could be doing the same thing for criminals. More…


advertisement


Whitepapers

  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here

    More…

  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers


    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement