Don't-Miss Security software Stories
When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.
Ultraslim terminals can reduce the costs and work involved in managing desktop systems.
These 5 services let you accept credit card payments with a smartphone.
E-mail is one of the most common methods of communication today--but if you aren’t careful, those digital messages may be intercepted or exposed.
With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.
Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for putting the pieces back together.
You’re doing a lot of stuff that's messing up your tech hardware--and your personal and professional life along with it. Here’s how to do better.
Even if you haven’t opted to run Linux on your computers, you can still use it to save malware-infected Windows machines.
What you don't know -- or refuse to learn -- about social networking could undermine your business
Deal with these all-too-common dangers to your data and critical business operations before it's too late.
IT departments are learning to master the art of retiring hardware at the right time. Here's what to consider when recycling hardware your company no longer needs.
Your data is your business. And if you're not vigilant about your employees' access to that data, you're going to end up out of business.
One of the biggest threats that organizations face is losing sensitive data -- such as payment card or personally identifiable information about customers.
Here's how to ensure that employees don't reveal private data when they log into public Wi-Fi networks at hotels, coffee shops and Internet cafes.
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions.