used with permission from Cisco If you’re reading this right now, you’re on the internet. You appreciate the ability to work, surf and shop on the world wide web without having your information exploited, and you think you know the basics: use secure sites, don’t store your credit card information, and don’t open sketchy emails.…

Read More

used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are working to make patching easier and more trustworthy – like Microsoft and its…

Read More

used with permission from Norton by Symantec Online fraud is a type of cybercrime that uses email, web sites, chat rooms or message boards. There are many different types of online fraud, including phishing and pharming scams, which use forged e-mails and Web sites to trick recipients into giving out personal information such as credit…

Read More

used with permission from Cisco Many small and medium-sized businesses do not have adequate network security. Here’s how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have…

Read More

used with permission from HP Technology at Work Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and…

Read More

Password Dos and Don’ts used with permission from Norton by Symantec by Marian Merritt There have been some well-publicized news stories of hacked websites where millions of user accounts and passwords were posted publicly. Can you imagine if you were one of those users affected? They likely had to hurry to change their credentials and…

Read More

The article re-printed courtesy of IBM ForwardView eMagazine Midsized companies are moving toward an infrastructure that is optimized and responsive to help them meet new business demands. This article in our series looks at the short- and long-term benefits of cloud computing and how midsized companies can start integrating some cloud services into their existing…

Read More