Security Policies

  • Human Behavior: A Critical Security Threat

    Whichever way one looks at network and data security, one of the most critical security vulnerabilities facing small and medium sized businesses is human behavior.
    By DavidK May 24, 2011 

  • Seven Security Checklists for Windows 7

    Take advantage of the available methods that Windows 7 can help keep the PC as safe and secure as possible. This article will discuss the 7 security checklist for Windows 7.
    By Donna Buenaventura May 24, 2011 

  • Employee Monitoring Advantages and Disadvantages

    While defending Farmville visits on company time and bandwidth is a tough sell privacy and morale mean there's much to consider on the topic of employee monitoring.
    By Finn Orfano May 22, 2011 

  • How to Use Backup and Restore in Windows 7

    Here’s how to use Windows 7 Backup and Restore, Windows’ integrated backup utility shipped in any Windows 7 edition. This article additionally sheds a light on Windows imaging, used in conjunction with Windows 7 Backup and Restore or in the...
    By Mark Muller May 20, 2011 

  • Security Options in Microsoft Office 2010

    The new edition of Microsoft Office provides better security in addition to several new features that everyone should use to advantage.
    By Donna Buenaventura May 19, 2011 

  • Why E-mail Scanning is an Essential Security Feature

    Many anti-virus vendors are offering advanced protection and that includes e-mail viruses’ scanner. Do you think e-mail scanner is important or unnecessary? Let’s discuss about it.
    By Donna Buenaventura May 18, 2011 

  • Advantages of Security Information Management Software

    What is Security Information Management? How do we apply that on our computers? What are the benefits of the programs which carry it out? What options do you have if you want to use one of these programs? These and more questions are answered...
    By Zack Jones May 9, 2011 

  • EV SSL Certificates and Firefox

    Extended Validation (EV) SSL certificates are obtained by following a strict identity verification procedure, providing an even more trustworthy certificate than those signed by a certificate authority. Find out more about Firefox EV SSL certificates...
    By Chad Anderson May 7, 2011 

  • What Is Your Employer's Computer Security Policy?

    Many employers have the same rules when it comes to formulating a computer security policy - make sure you know what they are!
    By Christian Cawley April 18, 2011 

  • How to Use Information Security Metrics

    The concept of information security metrics is much wider than it seems to an average computer geek. In short, these information security metrics help in creation and constant improvement of security systems so that you can use the Internet without any...
    By Arun Kumar (PowercutIN) April 4, 2011 
showing 11-20 of 78    < Previous  |  page: 1 2 3 4 5 ...  |  Next >