» Security

Symantec, Snoop Dogg team up to sell cybersecurity

September 7, 2010 by Sam Narisi

What’s it take to sell the kind of security software that’ll keep a computer safe? A good rap hook might do the trick. At least that’s the thinking over at Symantec, maker of Norton anti-virus software. More…

What do hackers want? Survey reveals their favorite targets

September 7, 2010 by Sam Narisi


What do cybercriminals love to see when they try to break into an organizations network? A recent survey reveals what vulnerabilities they look to exploit first. More…

Experts warn: Most passwords are too short

September 3, 2010 by Sam Narisi

As computers get more powerful, so do password cracking tools. Many businesses and users haven’t been keeping up. More…

Digital phones: Is someone listening in?

September 2, 2010 by Steve Hannaford

Internet-based telephony (known as VOIP, or voice over Internet Protocol) is being adopted in businesses across the country, thanks to its promise of lower monthly costs and easier administration, along with a set of productive software features (such as FollowMe call routing, voice mail e-mailing and phone number portability). More…

How to talk to execs about security funding

September 1, 2010 by Sam Narisi

Keeping company networks secure is a big part of IT’s job. But these days, departments often don’t get the funding they need to stay on top of the latest threats. More…

25% of malware spread by this overlooked threat

August 31, 2010 by Sam Narisi

It’s not just malicious websites and e-mail attachments anymore. These days, cybercriminals are using another method to spread malware: More…

New Web 2.0 threat: Add-ons and widgets

August 24, 2010 by Steve Hannaford

Employees aren’t getting the IT security messages. That’s the conclusion of a recent study of 2,100+ data security administrators from five countries conducted by the Ponemon Institute for Check Point software. More…

Portable protection for road warriors

August 23, 2010 by Steve Hannaford

With so much work being done now by telecommuters and laptop-toting road warriors, data security problems have become all the more complicated. There’s a real need for remote workers to log into their company’s data center without opening new opportunities for data loss and malicious attacks. More…

Security beyond printers and copiers

August 19, 2010 by Sam Narisi

While security issues involving printers and copiers have gotten a lot of press lately, there are other devices companies would be wise to consider when revamping security plans. More…

Security firm: The bad guys are winning

August 17, 2010 by Sam Narisi

Folks in charge of protecting IT security will often vent that they’re fighting a losing battle. But when a company that sells security products says it, it means a lot. More…

New drives enhance copier-MFP security

August 17, 2010 by Steve Hannaford

Disks on multifunctionals have been in the news lately. It’s become clear that data thieves can target drives on used computers, which often contain data from caching printed pages. More…

Study: Antivirus programs can’t be trusted

August 16, 2010 by Sam Narisi

All businesses use antivirus software to keep malicious programs off the company network. But a study shows why those applications should just be one part of an over-all security strategy. More…

5 tools for browser security testing

August 13, 2010 by Sam Narisi

A secure browser is often the first line of defense for a company’s network security. Here are some tools that can help find and fix security holes. More…

Latest security threat: Vacationing employees

August 12, 2010 by Sam Narisi

Can users in your company securely access data from outside the office? Secure or not, they’re going to try. More…

Are firewalls making your network less secure?

August 10, 2010 by Sam Narisi

Security infrastructure technologies, like firewalls, antivirus apps and management consoles, do a lot to keep hackers off of corporate networks — but they also open up their own holes for attackers. More…

Smartphone malware can auto-dial pricey calls

August 6, 2010 by Sam Narisi

As smartphones become more common, so do viruses that infect them. Take this recent attack that gives criminals an easy way to steal from mobile users.  More…

5 add-ons to boost browser security

August 3, 2010 by Staff

The folks at Google have touted Chrome as the safest web browser available. But determined hackers are always finding new ways to access your company’s sensitive information. More…

Remote access for employees — and for data thieves

August 3, 2010 by Steve Hannaford

New technology that lets users connect to the company network from remote locations could be doing the same thing for criminals. More…

How much are data breaches costing companies?

August 2, 2010 by Steve Hannaford

Assigning a money value to data breaches is difficult, but a new study is trying to set a baseline measure for corporate losses. More…

Smartphone hack can inflate your monthly bill

July 29, 2010 by Sam Narisi

Here’s one example of the latest security threat to watch for — attacks on company-issued smartphones.  More…

One common mistake companies make when shredding docs

July 27, 2010 by Steve Hannaford

A lot of businesses hire contractors to shred their sensitive documents. It can be a smart way to save on equipment costs and staff time — but if those companies aren’t careful, they could be opening themselves up to serious security threats. More…

PDFs are safe, right? Not anymore

July 27, 2010 by Steve Hannaford

There’s something about PDF files that makes users think they’re safe to open. And that’s exactly why they’ve become one of the preferred malware delivery vehicles for hackers. More…

Google Apps enhances mobile security features

July 23, 2010 by Sam Narisi

Smartphone security can be a significant challenge for companies. Those that use Google Apps are about to get some help. More…

Visa attempts to limit data vulnerability

July 22, 2010 by Steve Hannaford

Visa, Inc., recently announced a new payment security plan that it hopes will reduce the risk of data fraud and identity theft in its system of credit and debit cards. That could be good for both Visa and any company that accepts credit card payment. More…

Who’s most likely to steal from your company

July 21, 2010 by Sam Narisi

Companies face security threats from a lot of different angles. But there’s one area it could pay to keep an especially close eye on: More…

Hackers can use printers to get on your network

July 15, 2010 by Sam Narisi

Lately, you’ve probably heard a lot about the security risks posed by copiers and printers with built-in hard drives. But there’s another reason those devices could pose problems: More…

HP printers to get secure toner

July 14, 2010 by Sam Narisi

Businesses that have to print secure, tamper-proof documents may want to pay attention to this new product. More…

Phony Lady Gaga CD used to steal sensitive docs

July 13, 2010 by Sam Narisi

Many companies ban or regulate the use of external storage drives to prevent sensitive information from being taken out of the office. But a recent incident at the Pentagon offers a warning about another data theft method. More…

Inside hacker steals $1 million from charities’ bank accounts

July 12, 2010 by Sam Narisi

Companies spend a lot of energy keeping data safe from outsiders. But the real villains may be insiders — that’s the lesson learned by this bank, its employees and its customers. More…

Data security lessons from Russian spy ring

July 9, 2010 by Sam Narisi

You’d think a gang of spies would know a lot about document security — after all, it’s their job to exploit security holes to gain access to sensitive info. But it turns they make many of the same mistakes as your company’s users. More…



  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here


  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers

    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement