Don't-Miss Business security Stories

Tech Support Showdown: Battle of the Big-Box Chains

When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.

The Bumpy Road to Private Clouds

When we first heard about cloud computing, public clouds got most of the attention. But private clouds are set to grow in popularity.

Jackass IT: Stunts, Idiocy, and Hero Hacks

Sometimes you have to get a little crazy to find the right solution to technology problems gone absurd.

Thin Clients Fit the Bill When PCs Are Overkill

Ultraslim terminals can reduce the costs and work involved in managing desktop systems.

What Google's Search Change Means For Your Website

Now that Google tweaked its search algorithm to downgrade sites like DecorMyEyes that have bad reputations, small businesses should re-examine their search engine optimization strategies.

Process Credit Cards Anywhere: 5 Smartphone Alternatives

These 5 services let you accept credit card payments with a smartphone.

Top Secret! Keep Your E-Mail Private and Secure

E-mail is one of the most common methods of communication today--but if you aren’t careful, those digital messages may be intercepted or exposed.

How to Add Depth to Your IT Team's Bench

The potential for losing tech talent is on the rise these days. Here's how to keep today's talent and groom tomorrow's players.

Secure Your PC and Website From Firesheep Session Hijacking

With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.

How to Use Logs for Forensics After a Data Breach

Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for putting the pieces back together.

How to Choose Network-Attached Storage for Your Business

Network-attached storage can simplify your business's data management requirements. Here's what to look for when buying a NAS system.

DIY Tool Makes Your Own Antivirus Signatures

Big bad malware and zero-day attacks that fly under the radar of anti-virus software are hitting enterprises everywhere. With that in mind, HBGary is coming out...

Lock Down Your Android Devices

Learn how to protect the Android phones on your business network--and how to protect your business network from your Android phones.