Document Security

  • How to Make Email More Secure Against Viruses, Phishing and Other Threats

    Email security is obviously a concern when using the Internet, so here is a guide that lists ways to making email more secure. Emailers will find several options here in the article that can help them ensure they are safe and protected when sending and...
    By Daniel Brecht December 6, 2010 

  • Human Rights and Information Security

    The relationship between human rights and information security is often overlooked as governments, businesses, and individuals work to harden their networks and restrict information in effort to build power or profits. Here we look at human rights and...
    By Bruce Tyson November 29, 2010 

  • How to Secure a Fax Machine

    Data security seems to focus on computers, so many people fail to recognize their fax machine as a vulnerable device that can compromise valuable personal and business information. Read about how to secure a fax machine here.
    By Bruce Tyson November 28, 2010 


  • Secure Email Certificates: Do You Need Them?

    Do you care about your business's identity? Protecting a business name requires protection at your end, even with emails that your company is sending to customers and business partners. Keeping business emails private and secure builds trust and...
    By Donna Buenaventura November 27, 2010 

  • Free Email Solutions that Work with a Proxy Server

    Proxy servers operate in computer networks. Therefore, it is a server that functions as an intermediary for requests from clients seeking resources from other servers. This means that as a request comes in, and before the real server deals with it, the...
    By George Garza September 19, 2010 

  • Top 5 Layers of Information Security

    Information security is a protection mechanism. It starts with physical security and goes up to software and network security. By protecting the source of information at different levels, security administrators are able to develop a complete defensive...
    By George Garza September 13, 2010 


  • How to Assess Information Security Vulnerabilities

    Information security is a broad subject involving such things as logon authentication as well as preventing hackers from accessing your computer or network, or preventing malware from entering the computer. In that light businesses and individuals need...
    By George Garza August 25, 2010 

  • Manage and Improve PDF Document Security

    As more people use the Portable Document Format (PDF) for distributed content, security is an issue to avoid copyright infringement. A simple Word file allows anyone to read, edit and print content, but a PDF document blocks copying, editing and...
    By Lysis10 July 13, 2010 

  • Fax vs. Email Security

    This article will differentiate and discuss the difference between fax vs. email security from a content security standpoint.
    By Finn Orfano July 7, 2010 

  • Ideas to Promote Information Security Awareness

    It is important for every computer user to be aware of information security. Tips and tools, as well as how-to resources on Information Security Awareness, are presented within the article. Read on to know more.
    By Daniel Brecht June 24, 2010 
showing 21-30 of 33 < Previous   |   page: 1   2   3   4   |   Next >
Share
Additional Info
Additional Info