May, 2013

Hard Drive Encryption

In keeping with the theme of security, if you are storing valuable information on your machines, it is a good idea to encrypt your hard drives.  This way you are protecting your information in case your hard drive is breached.  Tech Republic identifies five applications that will assist you in encrypting your hard drive. One […]
Read more

Suspicious & Malicious Email

As mentioned in several different blog posts, email is such a common form of communication today that we use it in our everyday lives.  Unfortunately, just like everything else on the internet, there are risks when opening suspicious emails.  When discussing the future of security, according to Websense, “email threats will evolve to new levels. […]
Read more

The Future of Security

Adding to the overall theme of the past few blog posts, it is important to note what is going to happen in terms of security and threats going forth in the future.  According to Websense, “attacks will continue to exploit legitimate web platforms.  This includes hundreds of new content management systems and service platforms, in […]
Read more

Keeping you Secure from Malware

Security is so important in todays world of digital files.  We rely so much on what we have stored on our systems that is is vital that we protect our information.  The last thing that you want is for your information to be obtained by some hackers who exploit it.  An article posted by Websense […]
Read more

Programs for your Security Part Four

If your files and information leak into the hands of a hacker or someone who wants to use the information to their advantage, it can mean lots of headaches and steps to ensure that you are secure again.  In continuing with programs that will help you avoid your information leaking into the wrong hands, Tech […]
Read more

Spam Emails

We receive many emails each day, most of which are spam and emails that we send directly to trash.  According to Websense, “email-based threats evolved significantly to circumvent keyword, reputation and other traditional defenses.  Trust has eroded in the face of increased spear-phishing and other legitimate-appearing messages based on sophisticated social engineering.  Reliable email [...]
Read more

Webroot Protection

If you are looking for user or endpoint security for your business check out Webroot.  This program will keep your information secure and will block any viruses, spam, etc. that could be attempting to infect your system.  This program also allows you to select sites that are appropriate for your business environment. If you are […]
Read more

Programs for your Security Part Three

When looking for proper programs to protect your information, it is essential that you research which types of programs that best suit your needs.  Continuing with the topic of security, a third program that Tech Republic identifies as a good program to protect your information is Wise Folder Hider.  According to Tech Republic, “the application […]
Read more

IE10 and the Eye Ball

Ever notice a small eye ball icon next to the password field as you enter your password? Well its a new feature of IE10. You can click on the eye ball and see what your password is. For more info check out….. http://geekswithblogs.net/LifeLongTechie/archive/2013/03/19/be-aware-internet-explorer-10-has-a-password-eye..aspx
Read more

Programs for your Security Part Two

There are various risks on the internet but many tools you can use to protect yourself.  A second program that Tech Republic identifies as a good program to use to assist in keeping your data safe is KeyScrambler. “KeyScrambler Personal is a free tool that is designed to combat key loggers. The utility acts as […]
Read more