Security policies are an essential component of any security strategy. This topic contains articles which explain why you need security policies, how to create and implement security policies and how to get your employees to read security policies.
Industrial espionage was once a thorn in the side of companies on both sides of the Atlantic, often due to strict competition laws or interest from communist countries. Things have moved on since the 1970s and 80s, however - things have moved online, and it’s getting dangerous…
WinPatrol helps you in many ways. It offers security while also enhancing the functionality of your computer. There are not many WinPatrol tutorials available on the Internet so we thought of creating one for you.
Have you ever given your work computer a virus from home, or vice versa? Learn more about how to prevent this sort of thing.
What is Security Information Management? How do we apply that on our computers? What are the benefits of the programs which carry it out? What options do you have if you want to use one of these programs? These and more questions are answered in this article. Read on to find out more.
Extended Validation (EV) SSL certificates are obtained by following a strict identity verification procedure, providing an even more trustworthy certificate than those signed by a certificate authority. Find out more about Firefox EV SSL certificates and how to interact with them.
Many employers have the same rules when it comes to formulating a computer security policy - make sure you know what they are!
Laptop security audit programs can prevent many disasters in the company because they make it harder to suffer damage, in case a company laptop is stolen. No company should go without such a program.
Information about your company could literally bankrupt you if your competitors had access to it. And if you deal in highly confidential information you risk legal complications and lawsuits by not securing such data thoroughly. Safeguard your company’s information with physical security measures.
An Information Security Officer is a new job title with a variety of duties that were previously handled by risk management, compliance, the legal department, and the IT department of an organization. We took a look at several job postings and came up a with a list of an ISO’ duties.
The new edition of Microsoft Office provides better security in addition to several new features that everyone should use to advantage.