This tutorial will show you how to password protect Internet Explorer and restrict access to certain websites using the Content Advisor in Internet Explorer.
Advice about how to create and implement security policies and what security policies your business needs
Security policies are an essential component of any security strategy. This topic contains articles which explain why you need security policies, how to create and implement security policies and how to get your employees to read security policies.
Firewalls have been a core component of Internet security for a long time. Optimizing firewall security is an art unto itself. What are the top firewall security suggestions for your business? This article examines the top five firewall security tips that we have found.
We look at Software-as-a-Service providers and whether or not you should outsource your security to these third party providers – the answer may surprise you.
The concept of information security metrics is much wider than it seems to an average computer geek. In short, these information security metrics help in creation and constant improvement of security systems so that you can use the Internet without any worries.
If you are running Internet Explorer and have found that your Security Tab is missing in Internet Options, here’s how you’ll restore the tab.
Using limited user accounts and switching roles significantly improve your computer security with little effort and no cost. This article introduces roles to explain the difference between a limited user accounts and administrator, and then takes the need-to-do principle further to switching roles.
Authenticity is the fourth and final core concept we will explore. What do we mean by authenticity in Information Security? Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity.
Availability is the third of four concepts examined in this series of articles. In the ubiquitous Internet and wireless access era, information must be available 24/7, or whenever it’s needed. All the effort spent securing data from unauthorized access or integrity failures may go to waste.
In information security theory we encounter the acronym CIA which stands for Confidentiality, Integrity, and Availability. In this article series we will examine each of these concepts, and discover how we may use them. I also want to identify and add a fourth concept: Authenticity.
Though passwords can be created strong and unbreakable, not everyone pays attention to password security. Using Windows password policies, we can impose password rules on users. This article explains how to use the policy settings.
Defending against accidental or malicious misuse, loss, or theft of laptops is a crucial part of SMB security planning and design. In this section, we look at the differences between protecting these mobile devices and static desktop systems.
Whichever way one looks at network and data security, one of the most critical security vulnerabilities facing small and medium sized businesses is human behavior.