A poorly protected office printer can cause major security headaches. Here's what the threats are, and how you can combat them.
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
Here's everything you need to know about cloud computing, plus reviews of three service providers.
Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.
Great antivirus and antitheft for Android phones and tablets, but very pricey despite lacking features that some free apps provide.
Great free antivirus and antitheft protection for Android phones; but for remote functionality, the app requires sending SMS commands.
Whether or not Android's openness makes it an easy target for malware writers, these apps can help protect your handset.
Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.
If you lose your Android smartphone and didn't proactively install a security or remote locator app, you can still find your missing phone by following our handy guide.
Although a consumer-level router is good enough for some small businesses, you need stronger, more secure equipment that can handle traffic among many users. Here are the must-have features in a serious router.
Before you lock your company into a contract, consider these tips--they'll help you read between the lines of the carriers' fine print and make the smartest choice.
Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.
Discover which connection type and features are best for your business, and learn what to look for when comparing services.
ZoneAlarm Free Firewall 2012 gives good protection against hackers, but we'd like it better if it protected against Web-based exploits as well.