Computer Security


Recent Computer Security Articles

This Start-up Wants to Save You From Data Disaster

Axcient, which hopes to simplify data recovery for small businesses, has closed a $15.5 million funding round.  Read more

Why You Should Stop Reading This and Go Get a Data Backup Plan

Some half of small businesses never reopen after a data Armageddon. So why do less than half of small firms have plans if disaster strikes?  Read more

Would You Fire Someone for Taking Time Off to Donate a Kidney?

A mother's attempt to save her son spotlights holes in the Family and Medical Leave Act: It doesn't apply to businesses with fewer than 50 employees.  Read more

Would You Fire Someone for Scaring Off Robbers?

A Walgreens pharmacist fires a gun, he says, in self-defense, and then is fired.  Read more

Judge Orders Re-Hiring of Workers Fired for Facebook Complaints

A National Labor Relations Board judge says workers fired for off-duty griping about their jobs on Facebook should be re-hired.  Read more

Would You Fire Someone for Planking?

A GameStop employee posts a photo of himself planking, and gets himself and the co-worker who took the picture, fired.  Read more

How Secure Is Your Mobile?

Here's a title Google isn't likely to be trumpeting anytime soon: No. 1 target of mobile hackers.  Read more

America’s Fastest-Growing Security Company

Foreground Security CEO David Amsler and his employees hack into companies’ computer networks to protect them from the bad guys.  Read more

America’s Fastest-Growing Computer Hardware Company

A10 Networks makes and installs networking and IT security products.  Read more

What a "Second Internet" Means for Small Business

What if you could conduct business on a second, more secure Internet?  Read more

Benefits of NAS for Small Businesses and How to Set One Up

Network attached storage devices are gaining popularity as a way of sharing files among multiple computers. Here's why you should consider NAS for your busin...  Read more

Submittal Exchange

This software company uses the gazelle theory to mark progress and inspire growth.  Read more

Onboarding Done Better

An employee's introduction to the company is equally important to the later success of both the individual and the company. Here are some tips from top workp...  Read more

Kevin Poulsen, author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. 

Kevin Poulsen, is a former hacker and author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground .  Watch video

How to Create a Unified Culture in a Company With Multiple Offices

Crafting the right company culture in one office is hard enoughâ€"imagine trying to create a cohesive culture with employees all around the world.  Read more

How to Handle Employees Who Are Called to Active Military Duty

Knowing the appropriate steps to take when an employee is deployed is crucial to making the transition easy for them and your company. Here are four tips tha...  Read more

5 Tips for Buying a Server

Need to control your own data? If a server purchase is in your plans, here's what experts say you should know.  Read more

How to Prepare Your Office for Bad Weather

When the weather outside is frightful...your employees will cringe at the thought of coming in to work. Here are a few tips on bracing your staff for incleme...  Read more

A Decrease in Spam! Oh Wait, Nevermind

In late December and into early January, email spam Read more

How to Reduce Employment Practices Liability Claims

Employment practices liability (EPL) claims are on the rise. And, this time, it’s the economy, stupid.  Read more

What to Do When You Lose Your Computer

Laptop theft occurs more often than people would like to think. Here is what you should do if you lose your computer and all the data on it.  Read more

How to Set an Employee Gift Policy

What's acceptable to accept? Experts advise on what your employees should know about where the line falls between kindness and attempting to influence favors.  Read more

How to Choose a Data Center

Business owners need to be knowledgeable about the potential risks and rewards of using the services of a data center to back up their files.  Read more

Malware Takes Aim at USB Devices

USB devices are handy ways to transport information -- and trouble, according to a recent survey of more than 10,000 small businesses. Panda Security, which ...  Read more

The West Coast Advantage

Each day, Inc .'s reporters scour the Web for the most important and interesting news to entrepreneurs. Here's what we found today: ...  Read more

How to Select the Best Database Software

The right database software will turn columns and rows of data into valuable information that can drive your business.  Read more

Three Internet Security Programs

We tested three programs to see how they performed against malware and viruses.  Read more

3 Things to Never Say on Twitter

People forget that Twitter is permanent.  Once it's out there, it is on the Internet, forever. Here are some mistakes I've seen: Rule...  Read more

America's Fastest-Growing Security Company

LifeLock CEO Todd Davis gave out his Social Security number to demonstrate his confidence in his identity theft prevention company.  Read more

IT Integration

Is IT getting left out of the loop i...  Read more

How to Communicate Employee Expectations Effectively

Draw the best out of employees through thoughtful collaboration.  Read more

Apple App Store Hacked

The first signs of trouble happened over the holiday weekend when two app developers noticed their apps...  Read more

Three Terabytes in a Box

Congratulations, Seagate! The titan of data storage has done it again; this time in its debut of the first ever Read more

If You Own the Phone, You Can Read the Text Messages

A new Supreme Court ruling says employees' text messages are open to company scrutiny.  Read more