Network Access for Visitors and Subcontractors
With office guests and subcontractors frequently requiring access to office networks and servers, business experts suggest a set of policies that can …
Continue ReadingWith office guests and subcontractors frequently requiring access to office networks and servers, business experts suggest a set of policies that can …
Continue ReadingAll around the world there are major security breaches that affect both the stability and profitability of small businesses. PCI compliance is a major …
Continue ReadingSpam used to be a minor nuisance; today, it has become a major problem that cost businesses more than $100 billion in 2007. This article discusses the …
Continue ReadingOutpost Security Suite 2009 is an excellent all-in-one security suite that provides windows PCs with rock-solid protection from internet security …
Continue ReadingMail proxies are used mostly to control Spam - to stop unwanted e-mail from being delivered to your employees. But how do they work? More importantly, …
Continue ReadingWouldn’t you be suspicious if someone offered you more money than the actual sale price of an item, then expected you to wire transfer them back …
Continue ReadingWhen two or more people need access to a file or folder, you can create a workgroup share and put the data in it. Anyone with the correct permissions …
Continue ReadingDiskeeper Corporation’s Undelete 2009 is an easy to use file recovery solution that will protect your data against accidental deletion.
Continue ReadingThe word “biometrics” conjures up images of cyborgs, science-fiction movies, and futuristic realities that only exist in the realm of …
Continue ReadingMany security companies offer free products. Some of those products are fully featured, while others are stripped down versions of a pay-for product. …
Continue ReadingAcronis True Image products go beyond backing up important data. In this article, I evaluate the True Image solution for Microsoft Small Business …
Continue ReadingYou can have an anti-virus solution, security cameras, spam filters, firewalls, and password-protected screen savers, but, your small business PCs …
Continue Reading