Security Policies

  • Tips on Using a Company Laptop: Security Audit Programs

    Laptop security audit programs can prevent many disasters in the company because they make it harder to suffer damage, in case a company laptop is stolen. No company should go without such a program.
    By  Ada Stoy February 28, 2011 

  • Physical Security Concerns in Information Assurance

    Information about your company could literally bankrupt you if your competitors had access to it. And if you deal in highly confidential information you risk legal complications and lawsuits by not securing such data thoroughly. Safeguard your company's...
    By Radell Hunter February 25, 2011 

  • IE Security Settings: Risks and Benefits of Enabling Custom Level Security in Internet Explorer

    Enabling custom level IE security settings is a good option for an advanced computer user who is ready to take control of his computer. Users may be surprised to learn that it is also a good solution for the IE security-conscious newbie.
    By Sylvia Cochran February 7, 2011 


  • Finjan Secure Browsing vs. WOT: Which Is Better?

    Web of Trust (WOT) is a well-known security browser add-on. Finjan Secure Browsing is also a security add-on, although it is not as widely known. Which is better?
    By Jeremy Bost February 4, 2011 

  • Mobile Device Security in the Small Business Environment: Part 3

    The ability to "go mobile" is almost a necessity in today's business environment. Whether you have a simple work cell phone or a Blackberry and laptop, the convenience of having a mobile device for work purposes cannot be overstated. Consequently...
    By Finn Orfano February 4, 2011 

  • Mobile Device Security in the Small Business Environment: Part 2

    The ability to "go mobile" is almost a necessity in today's business environment. Whether you have a simple work cell phone or a Blackberry and laptop, the convenience of having a mobile device for work purposes cannot be overstated. Consequently...
    By Finn Orfano February 4, 2011 


  • Mobile Device Security in the Small Business Environment: Part 1

    The ability to "go mobile" is almost a necessity in today's business environment. Whether you have a simple work cell phone or a Blackberry and laptop, the convenience of having a mobile device for work purposes cannot be overstated. Consequently...
    By Finn Orfano February 4, 2011 

  • Better Password Management Using Windows Security Policy Console

    Though passwords can be created strong and unbreakable, not everyone pays attention to password security. Using Windows password policies, we can impose password rules on users. This article explains how to use the policy settings.
    By Finn Orfano February 4, 2011 

  • Windows 32-bit vs 64-bit: Which is More Secure?

    Which is more secure - Windows 32-bit or 64-bit? What are the advantages and disadvantages in using 64-bit edition in Windows? This article will discuss which is more secure – Windows 32-bit or 64-bit.
    By Donna Buenaventura February 4, 2011 

  • Is There a Need for Trust Seals?

    What is a Trust Seal? What criteria do vendors use when deciding whether to grant a Trust Seal? Is it safe to trust a company that has a Trust Seal displayed? Read this article to find the answers to these and other other questions.
    By Donna Buenaventura February 4, 2011 
showing 21-30 of 78 < Previous   |   page: 1   2   3   4   5  ...   |   Next >

Search