VIPRE Antispyware & Antivirus Review: A New Security Solution From Sunbelt Software
Sunbelt Software, the makers of the popular CounterSpy Antispyware introduced their new product called VIPRE Antivirus + Antispyware. Like you, …
Continue ReadingSunbelt Software, the makers of the popular CounterSpy Antispyware introduced their new product called VIPRE Antivirus + Antispyware. Like you, …
Continue ReadingStaying on top of system patches and updates is essential to keeping your computing environment safe from viruses, malware, and rootkits. These …
Continue ReadingMany small business owners work from a home office. Basic security measures should be implemented in order to maintain a stable work environment. …
Continue ReadingSpamTitan is an inexpensive yet full-featured, easy to manage solution for businesses seeking to protect their users and networks from spam and other …
Continue ReadingIn most cases a cookie is harmless. However, a cookie can be used to track information that you would rather keep private. Is leaving your system open …
Continue ReadingHave you ever questioned the sensitivity of a business document? Can I show this to my cubicle mate? Will I get in trouble if I email this to a …
Continue ReadingAVG Anti-Virus 8.0 Network Edition is a robust security suite that is ideal for small business environments that spend a lot of time online. And what …
Continue ReadingProtect your network from attacks and intrusions by having a plan in place. Learn how to create a layered defense to protect information on every …
Continue ReadingThe use of thin clients (for server-based computing) is the way of the future: the not-so-distant future. As technology in this field gets better, …
Continue ReadingSecurity testing and auditing is essential in order to test the effectiveness of your defences and establish areas in which your security plan needs …
Continue ReadingLogical controls, also called technical controls, are used to provide access to your organization’s data in a manner that conforms to management …
Continue ReadingPart 1 of this series included preventive software and hardware access controls. This article continues the series on logical controls with a …
Continue Reading