Don't-Miss Security software Stories
The California Supreme Court says cell phone data can be searched without a warrant, providing a powerful reminder to businesses to take data security seriously. Here are first steps.
Technology isn’t going to stop moving forward. It’s time to take stock of where your company’s tech is taking you--and of how to prepare for tomorrow.
When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.
Ultraslim terminals can reduce the costs and work involved in managing desktop systems.
These 5 services let you accept credit card payments with a smartphone.
E-mail is one of the most common methods of communication today--but if you aren’t careful, those digital messages may be intercepted or exposed.
With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.
Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for putting the pieces back together.
You’re doing a lot of stuff that's messing up your tech hardware--and your personal and professional life along with it. Here’s how to do better.
Even if you haven’t opted to run Linux on your computers, you can still use it to save malware-infected Windows machines.
What you don't know -- or refuse to learn -- about social networking could undermine your business
Deal with these all-too-common dangers to your data and critical business operations before it's too late.
IT departments are learning to master the art of retiring hardware at the right time. Here's what to consider when recycling hardware your company no longer needs.