Putting technology expertise to work for your business. More by Tony Bradley
It’s always fun this time of year to look back on the year we’re about to leave behind, and to make some predictions about what we might expect the year ahead to look like. We already have a comprehensive look back at the biggest security stories of 2012, and now here’s a look at some trends to watch for 2013.
These prognostications come from McAfee—the respected information security and antimalware company, not its international man of mystery founder. McAfee is one of the companies with a global presence and the skills and knowledge required to distill evolving trends and determine where things are headed.
McAfee shares some security predictions for 2013.Read more »
Putting technology expertise to work for your business. More by Tony Bradley
With Christmas only a few days a way, most businesses will be shutting down for a holiday break at the close of business today. It should be a time of peace and relaxation—a time to reflect on the year that has slipped away, and to envision goals for the year to come. But, it seems a majority of IT admins and security professionals will still be losing sleep over potential cyber attacks.
nCircle, an information risk and security management company, commissioned a survey of 270 IT security and business professionals. It asked a range of questions around information security risks and practices, and the breakdown of the results is interesting.
If you have solid security in place, you're not at any greater risk over the holidays.Read more »
Putting technology expertise to work for your business. More by Tony Bradley
A funny thing happened recently. A survey of 45,000 PCWorld readers found that a majority prefers Apple laptops. While that’s just one perspective from one audience, it represents a trend that Microsoft and Windows PC OEMs should be concerned about.
Large enterprises are too entrenched in Windows to shift the entire IT ecosystem to Mac OS X. It could be done, but like stopping a train, or turning a cargo ship—it would take some time.
Small and medium businesses, however, are more agile and can switch platforms on a whim. And, according to a report by Intermedia, recent SMB tech purchases are overwhelmingly favoring Apple. BGR states that nearly 70 percent of all smartphone activations for SMBs in the most recent quarter were iPhones, and more than 90 percent of the SMB tablet purchases were iPads.
Putting technology expertise to work for your business. More by Tony Bradley
Are you buying a new 7-inch tablet this holiday season, or hoping to receive one as a gift? Last year the original Kindle Fire sparked the success of the smaller tablet segment. This year there are a number of solid 7-inch tablet options, which is a good thing, but also means you have to weigh your options before choosing one.
The Kindle Fire is new and improved with the Kindle Fire HD, Barnes and Noble has stepped up its game with the Nook HD to go head to head with Kindle Fire, and Google and Apple have both entered the 7-inch tablet fray. Each has its pros and cons.
FixYa, a site with an online community for mobile device issues, has released a report detailing the most common complaints of the leading 7-inch tablets. The report aggregates data from thousands of technical support and troubleshooting inquiries from the FixYa site and its iOS mobile app.
Putting technology expertise to work for your business. More by Tony Bradley
There’s a sort of cruel irony to passwords. The legitimate passwords people need to use to access crucial applications or data are often forgotten, and yet the bad guys seem to be able to crack passwords without breaking a sweat. Thankfully, there’s a free tool available that can help you in either of these cases—Cain & Abel.
What is Cain & Abel? It’s described as a Windows-based password recovery tool, but it does much, much more than just password recovery. The software can capture and monitor network traffic for passwords, crack encrypted passwords using various methods, record Voice over IP (VoIP) conversations, recover wireless network keys, and more.
Passwords are the keys to almost everything.Read more »