We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Recently in Small Medium Enterprise Category

Update Update Update!!!

user-pic
Vote 0 Votes
As proof that IT pros must update often and on-time, and many still don't, a certain patch that Symantec issued seven months ago for a vulnerability in their antivirus software is still being actively exploited throughout cyberspace. That means that... Read More..
Categories: , ,

In a disturbing trend for the future of computer security, gone are the days of the lone hacker sitting in their basement looking to write the killer code that would one day make them famous, or better yet, infamous. Instead,... Read More..
Categories: ,

While many expect Moore’s law, which states that data storage will double every 18 months, to hold fast for another couple of decades or so, there is no law that tells you what to do with your old and inadequate... Read More..
Categories: ,

Found the following list at TaoSecurity and found it insightful. The 5 most common security mistakes follow: 1. Failure to maintain a complete physical asset inventory. 2. Failure to maintain a complete logical connectivity and data flow diagram. 3. Failure... Read More..
Categories: , ,

I came across this interesting article at DarkReading.com regarding how, even with all the recent news about security mishaps and hacker misdeeds, corporate decision makers still view computer security as something non-strategic, as something more akin to an operational expense... Read More..
Categories: ,

While it is always tempting to go out and buy the latest technological bells and whistles to protect the all-important corporate network, a recent study by Symantec indicates that, in the eyes of the on-line outlaw, they still see the... Read More..
Categories: ,

The risk of corporate networks being hijacked by hackers or employees sharing corporate devices with non-employees remains a considerable challenge for worldwide corporate security. While two out of three teleworkers said they were aware of the risk, many admitted that... Read More..
Categories: , ,

One in three people still jot down their computer password on a slip of paper, compromising a system's security, says a study released by Nucleus Research, a global research firm, and KnowledgeStorm. Because of this, companies are being urged to... Read More..
Categories: ,

Patches are now available to plug the security flaws found in the Bluetooth communications software that can give hackers the ability to compromise certain machines. Bluetooth technology allows computers to exhange information wirelessly over short distances (typically between 10 to... Read More..
Categories: , , ,

An article from Search Security reports that no matter the size of your company, your IT must always keep tight control over authenticating users and controlling network behavior. But where large companies have the resources to implement controls such as... Read More..
Categories: , , ,

Peter Schooff's blog is a daily look at what's going on in the world of computer security with an emphasis on how it affects businesses.

Peter Schooff

Peter Schooff is Contributing Editor at ebizQ, and manager of the ebizQ Forum. Contact him at pschooff@techtarget.com

Recently Commented On

Monthly Archives

Blogs

ADVERTISEMENT