Mastering the parts of your laptop

There’s no doubt that a lot of business owners and managers are now using laptops. You see them everywhere, in coffee shops, the malls, and even in the office. But the question is, do they even know enough about their laptops? If you’re hoping to get to know your laptop even more for example, its…

Safeguard your business with a DRP

Let’s accept the fact that disasters are inevitable. These kinds of situations can be threatening to human lives and business operations as well. In order to prevent further disruption in your business operations, you need to implement a comprehensive disaster recovery plan. These emergency plans can help expedite your business’s recovery, making it more painless…

To TheMoon with Linksys

Have a Linksys router? You’ll want to read this. Technical details about a vulnerability in Linksys routers that’s being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Over the last week security researchers from the SANS Institute…

The ultimate guide to defense in depth

Even the most reliable business network security and sophisticated user credentials can be vulnerable to cyber attacks to some extent. The concept of a comprehensive layered security, called defense in depth, is based on a strategy which has been around since the time of the Romans. A multiple-layered defense is created to prevent the advancement…

The most common mistake on Twitter!

Modern marketing is made up of a number of increasingly complex functions and systems, with one of the most important elements being social media. There are a number of platforms available to businesses and a popular one is microblog Twitter. While Twitter is fairly easy to use, there is actually a really common mistake that…

Device security while traveling

The Olympics is one of the most popular and well known sporting events in the world, and the 2014 Olympic Winter Games are well underway. This round, they are in Sochi, Russia and like every other event, there have been various organizational issues to deal with. Unlike the last Olympics however, one of those issues…

The top 5 ways to avoid getting hacked while visiting Russia (or anywhere, for that matter)

Yesterday (Feb 5 2014) NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. After further examination we found that the technical details of the hack didn’t make sense. Really, the exploit…

Dropbox: Taming the Wild West

A modern-day Wild West can be found in the slapdash enterprise use of cloud-based file storage and sharing. But new security technologies puts user-managed security atop those platforms without burdening the IT department with lots of administrative overhead. “Transparent layers of encryption with enterprise-owned and managed private keys can now be implemented on top of…

iPad Air tricks you should know

Apple has a wide variety of products that cater to an equally wide array of users. Many business users have taken to the iPad like a duck to water. This highly portable device allows users to connect with the office and do work while on the go. One of the newest iPads, the iPad Air,…