Data Security


Recent Data Security Articles

Passing on Your Digital Data

Services like Legacy Locker help entrepreneurs with digital estate planning and password management.  Read more

Google Asks NSA for Help Fighting Cyber Attacks

As reports warn of growing threats to cyber security, the fiercely independent Google calls on the nation's largest intelligence agency for help. Privacy adv...  Read more

For Holiday Cheer, Keep Customer Data Safe

To stand out this Christmas, small merchants are putting shoppers’ safety first. E-tailers are beefing up anti-fraud programs and other security measures t...  Read more

Is Your Small Business Cyber-Secure?

A new study says that when it comes to cyber security, the majority of the country's small businesses are not adequately equipped for attacks.  Read more

Is Your iPhone Backup Adequate?

You rely on your iPhone to handle critical business matters, but are you as careful backing up data on your iPhone or smartphone as you are on your PC? Maybe...  Read more

During the Downturn, Don't Scrimp on Security

The recession may have taken a bite out of your IT budget, but now is not the time to get lax about data protection.  Read more

No Downturn for Privacy Practices

The recession may have taken a bite out of your IT budget, but it’s no reason to get lax about customer privacy and other data protection practices.  Read more

Security: Free Antivirus Software

Affordable antivirus software provides network security  Read more

2009 Tech Security Forecast

In 2009, IT experts predict more malware and other attacks on company networks coming from mobile devices, social networks, and faster Internet connections, ...  Read more

Free Tips to Protect Data on the Go

There are a growing number of ways to protect your sensitive business data -- and sometimes customer data, too –- with tools that won't cost you nothing.  Read more

Secure Your PCs for Free

There are some no-cost solutions to protect your company's data. But is free software worth the risks to your business?  Read more

Help! Somebody Save Our Files!

No one comes to work expecting an IT crisis, but heart-stopping technical meltdowns or security breaches happen every day. How to handle and prevent the most...  Read more

Providing a Safety Net for Confidential Data

As small businesses outsource more work and switch to Web-based applications, it’s critical to have practices in place to safeguard confidential company in...  Read more

Would Your Network Survive a Targeted Attack?

Attacks targeted at a single company are on the rise, and according to one analyst are "trickling down" from large companies to small ones. Think you're busi...  Read more

Tech Talk: Fashion Designer Upgrades Firewall

A designer of haute couture better secured the growing firm's network after being informed by the FBI that a hacker compromised their computer systems.  Read more

Can Outsourcing Better Protect Customer Data?

If your business stores customer data, you may be subject to laws and regulations regarding the proper protection of this data. Some businesses are now outso...  Read more

Tech Talk: E-mail Storage Sails for Boat Supplier

A Florida-based firm that custom manufactures hydraulic equipment for large yachts worldwide deployed an e-mail archiving solution that manages the company's...  Read more

Tech Talk: Firm Uses Backup for Accountability

A Houston energy company found that a remotely managed backup solution involving storing data off site could help comply with regulations in addition to meet...  Read more

Is Security Software Choking Your System?

Take anti-virus, anti-spyware, anti-spam, and more security applications off your office computers? Security companies are now offering unified threat manage...  Read more

Log Management: What's in Your Log Files?

Log files are like internal surveillance cameras, recording everything that happens inside servers, network devices, and some applications. Here's how to mak...  Read more

Instituting Security Metrics

Tired of running your IT operation based on FUD (fear, uncertainty and doubt)? Instituting security metrics can help provide a more logical approach to secur...  Read more

Slouching? Measure Your Security Posture

There is an optimal "security posture" for a business -- the approach your business takes to security, from planning to implementation, from hardware to netw...  Read more

Avoid Security Pitfalls with Subcontractors

Increased reliance on outsourcing IT and data services has left businesses vulnerable if the subcontractor suffers a data breach. Ground rules can keep subco...  Read more

Is Your Business PCI Compliant?

Nearly every business that processes credit-card payments will have to comply with payment card industry (PCI) standards, which are very specific about how d...  Read more

Is Your Network Secure -- Physically?

Businesses spend big bucks on security software, but FBI research shows the majority of security breaches come from physical mistakes such as not having a pa...  Read more