Don’t just unplug your USB device

One of the most common ways to connect peripherals to your computer is by using a USB connection. You can connect a multitude of things, including your phone, external hard drives, mice and keyboards. Often many employees will plug one of these in, and when they’re done using it just unplug it. Doing this could…

Details

Facebook’s useful hidden features

One of the most popular things software developers do is provide hidden functions, often called easter eggs. These features are sometimes jokes, other times they’re a useful function that for some reason was deemed not important enough to make it onto the main parts of the program. Facebook has some hidden features that are useful…

Details

Peering through the vapor: Simplifying the Cloud

The term “Cloud” seems like it is everywhere these days. Cloud backup, cloud PC, even Cloud assistants. Gone are the days where “Cloud” meant multitenant geographically separate always-on service. Today important concepts like retaining Intellectual Property (IP), country of origin, distribution restrictions, and data-at-rest protection all must be considered when evaluating a cloud strategy for…

Details

Securing IPv6 Networks

For 20+ years IPv4 has been the world standard for Internet-attached device communication. As we enter the age of IPv6 a new gamut of security, performance, and equipment challenges are being revealed. Recently, FortiNet teamed with BreakingPoint to perform a real-world ultra-high bandwidth test of an IPv6-enabled FortiGate firewall. This test series yielded some surprising…

Details

LinkedIn springs a password leak

Business owners often have multiple accounts with many different websites and Web services. There’s one element that links them all together, no matter their purpose: the password. A password is an owner’s sacred key that’s trusted to very few people. You expect that when you share your password with a website, it’s secure. This isn’t…

Details

Processors everywhere, which to pick?

One of the most commonly marketed features of computers is the processor. The only problem is that the information can be a little confusing, as there are literally hundreds of different processors available, each with some sort of special feature. There’s no need to be confused, in fact, picking a processor really comes down to…

Details

Watch out! Facebook used to spread worms

The security of a network and the systems within it is top of mind for many IT professionals and business owners. As such, many small business owners are implementing security measures to ensure their system stays secure. There’s a new malware program that could threaten the security of your system, regardless of which OS you…

Details

Backup your data or lose it all

With the increasing amount of serious disasters striking around the globe, businesses are taking steps to ensure that they can keep operating during an emergency and that their data is protected. Striving to protect your data by backing it up is a good business practice, and can help ensure your company will remain open and…

Details