Probably the most insidious malware, keyloggers collect everything you type on your keyboard and make it available to cyber-criminals. This article examines how keyloggers work, two types of keyloggers, and what you can do to protect your privacy.
Not all spyware protection comes with a cost. However, if you prefer to rely on fee-based products to prevent and clean up spyware, this article examines a few products which help with the questions, “How do I get rid of spyware?” and “How do I stop spyware?”
Have you ever wondered how spyware works? How does spyware get onto your computer? What happens if you get spyware? This article answers these questions and more.
One of the many classes of things you don’t want to find its way to your computer is spyware. Spyware, and its near cousin adware, are unwanted guests which frustrate, and sometimes violate the privacy of, users. In this article, spyware is defined.
Before securing your network, you need to know what it is you’re trying to do. In this article, we look at the definition of network security. We also look at why this is even necessary as we walk through the history of network security.
Once your network is configured, you and your employees will start using it in a way which results in sensitive information residing on servers and workstations. The best way to protect this information is to control who can see or change it. This is where access control comes in.
Encryption is a big topic, much bigger than can be fit into a section of a small, business manual. This article provides enough information about the how, what, and why of encryption that an owner or manager of a SMB knows when it’s reasonable and appropriate to encrypt information.