Computer Security


Recent Computer Security Articles

The West Coast Advantage

Each day, Inc .'s reporters scour the Web for the most important and interesting news to entrepreneurs. Here's what we found today: ...  Read more

How to Select the Best Database Software

The right database software will turn columns and rows of data into valuable information that can drive your business.  Read more

Three Internet Security Programs

We tested three programs to see how they performed against malware and viruses.  Read more

3 Things to Never Say on Twitter

People forget that Twitter is permanent.  Once it's out there, it is on the Internet, forever. Here are some mistakes I've seen: Rule...  Read more

America's Fastest-Growing Security Company

LifeLock CEO Todd Davis gave out his Social Security number to demonstrate his confidence in his identity theft prevention company.  Read more

IT Integration

Is IT getting left out of the loop i...  Read more

How to Communicate Employee Expectations Effectively

Draw the best out of employees through thoughtful collaboration.  Read more

Apple App Store Hacked

The first signs of trouble happened over the holiday weekend when two app developers noticed their apps...  Read more

Three Terabytes in a Box

Congratulations, Seagate! The titan of data storage has done it again; this time in its debut of the first ever Read more

If You Own the Phone, You Can Read the Text Messages

A new Supreme Court ruling says employees' text messages are open to company scrutiny.  Read more

Would You Fire an Employee Over a Negative Facebook Post?

A pizza restaurant raises hackles – and consciousness – about corporate social media policies by letting a waitress go for ranting about a customer.  Read more

Do You Comply With the FTC's Red Flag Rule?

Regulations to help prevent identity theft go into effect June 1, and chances are you've got some work to do to comply with them. Here's what you need to know.  Read more

Does File-Sharing Threaten Your Sensitive Data?

Whether your employees are using peer-to-peer technology to download the latest game or video or to share work-related documents, their actions may place you...  Read more

Smartphone Security Start-up Lookout Raises $11 Million

San Francisco-based Lookout's fundraising ability is partly thanks to the exploding smartphone market -- and the risks that come with it.  Read more

Facebook Unveils New Security Features

Social networking site boosts security features in the face of mounting criticism over its efforts to protect privacy.  Read more

9 Avoidable Workplace Health and Safety Hazards

Workplace health and safety hazards can be costly (to lives and the bottom line), but the good news is that they are largely preventable if you take the righ...  Read more

Some Advice on When to Take Advice

When entrepreneurs should ignore advice. Entrepreneurs are inundated with advice from customers, partners, investors; everyone has an opinion on ho...  Read more

Have You Checked Your Facebook Privacy Settings Recently?

A Facebook glitch points up more security problems on the social networking site, while a new survey shows some people (your employees, perhaps?) don't take ...  Read more

How a Write a Warning Letter for Employee Conduct

When employee behavior or poor performance don't shape up after verbal warnings, its time to get formal. Here's how to do it right.  Read more

3 Remote Tech-Support Services

Create your own virtual IT department.  Read more

Lost a Smartphone? Track It and Erase Data

These days, a lost smart phone is not just a shame. It’s a potential nightmare for a business. That phone may have confidential data about customers, partn...  Read more

How to Handle Employee Complaints

Employee complaints alert you to major problems in your business. Here's how to take action without getting sued or having your dirty laundry aired on Gawker.  Read more

What is XML and Why Should Companies Use It?

By using Extensible Markup Language, or XML, companies can parse information including data and content in a variety of ways.  Read more

High Times for Employers Over Oregon Medical Marijuana Ruling

Oregon's highest court rules that employers don't have to accomodate medical marijuana use despite a state law allowing approved patients to light up.  Read more

Business 101 from Spongebob Squarepants

iPad apps hit the store . The release of the iPad is still one day away, but iPad app developers, anticipating huge demand, are already hawking th...  Read more

China: Malware Capital Of The World

What a claim to fame for Shaoxing, China. It holds the world record for most malware attacks coming out of the country with the national title in the same...  Read more

How to Prevent Identity Theft in Your Business

Of all the security issues companies face, identity theft is one of the scariest, since it has the power to damage your relationship with key customers and e...  Read more

Managing IT Through SaaS

SaaS continues to grow in popularity for a number of reasons. Even IT folk are catching on, Read more

Cell Phones: A Security Risk to Your Business?

As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to viruses, Trojan horses, and worms. Take these key steps to pro...  Read more

Better Marketing Through Science

Washington girds for health care vote . The passage of President Obama's health care plan looks Read more

Why You Should Make Privacy a Priority

A new study ranks America's most trusted companies -- and reveals customers' feelings about how safety affect the brand.  Read more

Passing on Your Digital Data

Services like Legacy Locker help entrepreneurs with digital estate planning and password management.  Read more

Study: Smartphones Highly Vulnerable to Hacks

Smartphones are really just mobile computers, and so are open to attack. Just how real is the threat?  Read more

March Madness: Time to Control Staff Web-Surfing?

In late December, Fidelity Investments canned an employee for playing fantasy football on company computers. With March Madness only a few weeks away, is it ...  Read more

Report Says Google Attack Traced to Two Chinese Schools

Sleepless nights ahead for CEOs: The same hackers also have launched similar assaults on other companies -- and a new (and unrelated) attack has hit some 2,5...  Read more