Better security due to authentication

The recent LinkedIn password breach and the various Mac and Windows Trojan horses have many small business managers wondering if their data is actually safe. Even if you take steps to ensure safety, they may not be enough and your data may still be at risk. One method companies could implement is two factor authentication.…

Intel gives processors a Turbo Boost

A few months ago Intel released the Ivy Bridge processor. Subsequently, computer manufacturers have been releasing computers with the processor and have been extolling the benefits of upgrading, along with some new features like Turbo Boost. These terms can be confusing and could trick you into unnecessary upgrades. Here’s an overview of what exactly Ivy…

Prepare for the worst with BCP

Disasters happen on a daily basis. Sometimes they’re big, wiping out communities, other times they’re small, affecting one online machine or computer. No matter the size of disaster, it pays for businesses, especially small businesses, to prepare for the worst. The only problem is, many small businesses don’t prepare and pay the price. When a…

Don’t just unplug your USB device

One of the most common ways to connect peripherals to your computer is by using a USB connection. You can connect a multitude of things, including your phone, external hard drives, mice and keyboards. Often many employees will plug one of these in, and when they’re done using it just unplug it. Doing this could…

Facebook’s useful hidden features

One of the most popular things software developers do is provide hidden functions, often called easter eggs. These features are sometimes jokes, other times they’re a useful function that for some reason was deemed not important enough to make it onto the main parts of the program. Facebook has some hidden features that are useful…

The end of the .com era as we know it!

As we exit the age of IPv4 and move into the IPv6 generation another change is taking place on the Internet that will be far more visible to most users. The dot com era may soon draw to an end, and that could lead to some unexpected headaches on corporate networks around the world.The Internet…

Peering through the vapor: Simplifying the Cloud

The term “Cloud” seems like it is everywhere these days. Cloud backup, cloud PC, even Cloud assistants. Gone are the days where “Cloud” meant multitenant geographically separate always-on service. Today important concepts like retaining Intellectual Property (IP), country of origin, distribution restrictions, and data-at-rest protection all must be considered when evaluating a cloud strategy for…

Securing IPv6 Networks

For 20+ years IPv4 has been the world standard for Internet-attached device communication. As we enter the age of IPv6 a new gamut of security, performance, and equipment challenges are being revealed. Recently, FortiNet teamed with BreakingPoint to perform a real-world ultra-high bandwidth test of an IPv6-enabled FortiGate firewall. This test series yielded some surprising…

LinkedIn springs a password leak

Business owners often have multiple accounts with many different websites and Web services. There’s one element that links them all together, no matter their purpose: the password. A password is an owner’s sacred key that’s trusted to very few people. You expect that when you share your password with a website, it’s secure. This isn’t…