Data Security


Recent Data Security Articles

6 Major Tech Innovations for 2012

These trends could make for huge opportunities--or huge disruptions to your business. Either way, they are ones to watch.  Read more

Are You an Oversharer Online? How to Tell

A new tool scans all of your online activity and lets you know if it's in danger of tainting your reputation.  Read more

5 New Apps & Tech Tools to Try

Dozens of new gadgets and Web services promise to boost your business. Here are five that just might deliver.  Read more

7 Classic Tech Blunders to Avoid

Any of these mistakes could cost you time, money, and the security of your business.  Read more

Zappos' Security Breach: Are You Next?

The hackers didn't get credit card information but what they did get is potentially more dangerous. Don't let it happen to your business.  Read more

Do You Have a Privacy Problem?

Google, Facebook, and others have made consumers particularly sensitive about their privacy online. That means you need to be sensitive about it too.  Read more

Why You Might Be a Prime Target for Cyber Criminals

Hackers stole credit card data from 200 businesses over three years and racked up $3 million in bogus charges. Don't think it can't happen to you.  Read more

New Ways to Keep Hackers Out of Your Business

Want to keep your computers, e-mails, and business secrets safe? Learn the latest in data encryption.  Read more

You’re Being Sued. Do You Know Where Your Data Is?

Once upon a time, you simply handed over the contents of your file cabinets to the lawyers. In the digital age, the task is much more complicatedâ€"and expen...  Read more

This Start-up Wants to Save You From Data Disaster

Axcient, which hopes to simplify data recovery for small businesses, has closed a $15.5 million funding round.  Read more

Why You Should Stop Reading This and Go Get a Data Backup Plan

Some half of small businesses never reopen after a data Armageddon. So why do less than half of small firms have plans if disaster strikes?  Read more

Benefits of NAS for Small Businesses and How to Set One Up

Network attached storage devices are gaining popularity as a way of sharing files among multiple computers. Here's why you should consider NAS for your busin...  Read more

Kevin Poulsen, author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. 

Kevin Poulsen, is a former hacker and author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground .  Watch video

How to Choose a Data Center

Business owners need to be knowledgeable about the potential risks and rewards of using the services of a data center to back up their files.  Read more

How to Select the Best Database Software

The right database software will turn columns and rows of data into valuable information that can drive your business.  Read more

Apple App Store Hacked

The first signs of trouble happened over the holiday weekend when two app developers noticed their apps...  Read more

Three Terabytes in a Box

Congratulations, Seagate! The titan of data storage has done it again; this time in its debut of the first ever Read more

Do You Comply With the FTC's Red Flag Rule?

Regulations to help prevent identity theft go into effect June 1, and chances are you've got some work to do to comply with them. Here's what you need to know.  Read more

Does File-Sharing Threaten Your Sensitive Data?

Whether your employees are using peer-to-peer technology to download the latest game or video or to share work-related documents, their actions may place you...  Read more

Have You Checked Your Facebook Privacy Settings Recently?

A Facebook glitch points up more security problems on the social networking site, while a new survey shows some people (your employees, perhaps?) don't take ...  Read more

Lost a Smartphone? Track It and Erase Data

These days, a lost smart phone is not just a shame. It’s a potential nightmare for a business. That phone may have confidential data about customers, partn...  Read more

What is XML and Why Should Companies Use It?

By using Extensible Markup Language, or XML, companies can parse information including data and content in a variety of ways.  Read more

China: Malware Capital Of The World

What a claim to fame for Shaoxing, China. It holds the world record for most malware attacks coming out of the country with the national title in the same...  Read more

How to Prevent Identity Theft in Your Business

Of all the security issues companies face, identity theft is one of the scariest, since it has the power to damage your relationship with key customers and e...  Read more

Why You Should Make Privacy a Priority

A new study ranks America's most trusted companies -- and reveals customers' feelings about how safety affect the brand.  Read more