dcsimg

Most Recent Data Security

Printers, The Forgotten Security Link

April 07, 2010 |
As companies and individuals focus on data security on computers, smartphones and mobile devices, they may forget to secure their printer. Too often, printer security is little more than making sure
READ MORE

Where Should You Focus Your Security Emphasis?

April 06, 2010 |
Last December, IT Business Edge blogger Mike Vizard wrote about security delusions in compliance, stating: All too often, there is a tendency to measure security in terms of compliance.
READ MORE

Endpoint Security Concern Remains High

April 05, 2010 |
One of the greatest challenges in data security is protecting a moving target. With laptops, netbooks, smartphones, portable hard drives and other multiple devices, developing a good security plan
READ MORE

Banking Industry Continues Its Fight Against Cybercrime

April 02, 2010 |
As I was reading some older articles here, I came across this piece by Susan Hall, where she wrote: A new class of malicious software is directed at online security technology implemented by Bank of
READ MORE

Drinking from the Well of Poisoned Searches

March 31, 2010 |
You need to do a little research, so what do you do? Like millions of others, you Google it.   However, that simple search could be putting your computer at risk. According to Patrik Runald at
READ MORE

Password (not) Protected

March 29, 2010 |
This story on stolen passwords caught my attention for a couple of reasons. First, it is from my hometown newspaper, and secondly, I found it moments after seeing a CNET article referencing a
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

8 Layers of Security Every Computer Should Have

March 26, 2010 |
Every time you connect to the Internet, you are putting your computer -- and the information stored there -- at risk. As Roger Thompson, chief security officer with AVG Technologies told me:  
READ MORE

Beware: That Ad Might Create Zombies

March 24, 2010 |
A couple of weeks ago, readers who visited the popular pundit Web site, the Drudge Report, claimed the site was the source of malware that infected their computers. Sadly, one senator tried to put a
READ MORE

As Amount of Digital Health Data Rises, So Does Risk

March 22, 2010 |
All the talk about health care in the news reminded me that I had to schedule an appointment with my doctor. Rather than call the office, I went to a Web site where not only can I take care of
READ MORE

Virtualization Is Hot, but Is It Secure?

March 19, 2010 |
The growth of virtualization is a hot topic these days, including at IT Business Edge. Arthur Cole presents his top 10 benefits for virtualization in enterprise. Mike Vizard talks about hybrid client
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS