Don't-Miss Security software Stories

Five Ways to Protect Your Email at Work

Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.

Digital Signatures Let You Ditch That Old Fax Machine

E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.

10 Nightmares When Traveling With Tech--and How to Prevent Them

When traveling with smartphones, tablets, and laptops, a small hiccup can derail work for your entire trip. How can you avoid these nightmares on your next business trip?

7 Ways to Protect Your Printers

Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.

Stay Connected When Disaster Strikes

Remote monitoring and control systems enable you to troubleshoot your data center from afar. Here's how to ensure you can connect to them in an emergency.

Lock Down Your Wi-Fi Network: 8 Tips for Small Businesses

By default, Wi-Fi is not secure. But these best practices will help you lock down and encrypt your company's wireless connections, both in and out of the office.

Wi-Fi Security Do's and Don'ts

These 11 tips will help you protect your wireless networks.

How To Lock Down Your Wireless Network

Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.

Get Started Managing Multiple PCs with Windows Intune

Discover Microsoft’s new cloud-based service to remotely secure, monitor, manage, and assist PCs via the Internet. Check out the features and see how to get started.

Five Steps to Mobile Device Management and Security

As more employees bring smartphones and tablets to work, managing the devices, securing data, and fighting malware is critical.

Online Privacy: How to Block Google Ads and Adjust Your Settings

Sometimes the ads that appear in your Google search results or in Gmail are a bit of a mystery.

5 Things You Need to Know About Android Phones

Android phones are in high demand by workers, but they lack key security features. Here's how to make sure Android phones are used safely in your company.

How to Use DiskCryptor to Encrypt Your Hard Drive

Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.