You may have seen the term BYOD mentioned around the Internet lately.
BYOD is an acronym for “Bring Your Own Device” – its an approach that a business can take that allows their staff to bring their own computer to work instead of using the company supplied one.
The benefits of implementing a BYOD policy usually mention... Read More
1. Staff are your weakest link
Regardless of firewalls, anti-virus and spam-filtering software protecting your business assets they can all be compromised by staff not trained in basic security practices.
Your business should have a well defined security policy that includes a staff section including rules such... Read More
The Internet is filled with websites that are inappropriate for anyone, much less children. Kids get into trouble online all the time, even when they aren’t looking for it. Misspelling a website address, screwing up a search term, or clicking a risqué ad can lead to some awkward bedtime conversations. Online bullying,... Read More
There’s a lot to like about Google Chrome’s built-in security features. The browser offers unique sandboxing functions and privilege restrictions, and even updates itself in the background to help better protect you from hackers and malware. But like all browsers, Chrome is imperfect, and there are steps you can take to protect it from attack. Here’s how to... Read More
To The Unfakeable Digital Anarchist Currency Everyone’s Obsessed With
What is Bitcoin?
Bitcoin is a decentralized, anonymous, digital-only currency that’s lately gotten a lot of public attention.
But this isn’t some brand new invention — Bitcoin was originally developed in 2008.
In 2008, someone using the pseudonym “Satoshi Nakamoto” published a paper... Read More
Feedly is cleaning Google Reader’s plate.
The RSS feed reader app says it has picked more than 500,000 Google Reader users since Google announced it will be killing Reader on July 1.
The reason? Feedly has made it simple for Google users to... Read More
Leading privacy expert Caspar Bowden has warned Europeans using US cloud services that their data could be snooped on. In a report, he highlights how the Foreign Intelligence Surveillance Act Amendment Act (FISAAA) allows US authorities to spy on cloud data.
This includes services such as ... Read More
These days when I’m consulting with big businesses, governments, and other organizations, two main topics come up over and over: pass-the-hash attacks and hacktivism. One government client put it thusly: “Our department considers pass-the-hash attacks our No. 1 threat, above all other computer threats.” A lot of things are broken in... Read More
When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the — at times gaping — shortcomings of traditional approaches to securing IT systems and data.... Read More
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics.
Even if you never email sensitive information–social security numbers, banking info, business secrets, and so on–you should consider using encryption. Aside from... Read More