Technology >> Browse Articles

Browse Security and Surveillance Articles

  • +1

    21 Best Ways to Lose Your Data

    Have you ever wondered what the best ways are to get hacked, be adversely affected by disasters, or otherwise lose information stored on your computer systems? Here, in no particular order, are the 21 best ways to not secure your systems: 1. Don’t pay attention to or even bother to understand what you’re trying to protect. 2. Leave your databases, especially ...
    Published about 8 years ago | Rated: +1
  • Rate

    How to Choose a Good Password

    How to Choose a Good Password
    Throughout your day, you will use numerous computers, PDAs, online accounts and other electronic devices that all require passwords to protect your information. Choosing a complex password is important, but it needs to be memorable enough that you don’t need to write it out on the back of your hand with a Sharpie pen. Here are some standard guidelines for choosing ...
    Published almost 8 years ago | Rate This
  • +1

    How to Choose the Right Anti-Virus Software

    How to Choose the Right Anti-Virus Software
    If you have a computer, you need anti-virus protection. If your computer is new, it might come with a trial version of a program, but it might not be the right one to meet your computing needs. If your computer is due for a renewal of its anti-virus software, you might want to check out other anti-virus programs. Either way, you ...
    Published almost 8 years ago | Rated: +1
  • Rate

    Cyber Attacks Against Small Businesses Grow

    Cyber Attacks Against Small Businesses Grow
    WASHINGTON - Cyber criminals are increasingly targeting small and medium-sized businesses that don't have the resources to keep updating their computer security, according to federal authorities. Many of the attacks are being waged by organized cyber groups that are based abroad, and they are able to steal not only credit card numbers, but personal information - including Social Security numbers ...
    Published about 8 years ago | Rate This
  • +1

    10 Practical Suggestions To Grow Your Business in 2010

    10 Practical Suggestions To Grow Your Business in 2010
    As the aliens of the TV show "V" would say, humans are quite predictable, we are creatures of habit. One of our big habits are New Year's resolutions. We hardly keep them, or at least all of them, but they are good to at least write down and try to do for the first few minutes, hours, days or weeks of ...
    Published almost 8 years ago | Rated: +1
  • Rate

    Connect in Private: Privacy in E-Mail and Calls

    Connect in Private: Privacy in E-Mail and Calls
    Building a business is about reaching customers and helping them. Today’s world is more interconnected and that helps make connections more fluid. The downside of that increased fluidity in connections is that the bad guys can also get to your private email easier. Eternal vigilance, it has been said, is the price of liberty. In the same way, we must continually ...
    Published over 7 years ago | Rate This
  • Rate

    Using VPN Connections in Vista

    Using VPN Connections in Vista
    In the remote connections you’ve seen so far, the security exists mostly at the connection point. That is, you set up usernames with strong passwords, and no one can access your dial-up or Remote Desktop connection without entering the correct logon data. This works well, but it doesn’t do much for the actual data that’s passed between the host and client. ...
    Published about 8 years ago | Rate This
  • Rate

    Free Microsoft AV Suite Beta

    Free Microsoft AV Suite Beta
    ‘Priced at free, this one should be a hot seller.’ Microsoft is putting consumer antivirus makers on notice Tuesday, when it will release the beta of its Microsoft Security Essentials, a new anti-malware suite. Unlike its predecessor, Live OneCare suite, a subscription service which is being phased out, the new software will be offered for free to consumers. Like traditional antivirus ...
    Published about 8 years ago | Rate This
  • +2

    9 Steps to Better Security

    9 Steps to Better Security
    Some data security attacks are done by those who just want the challenge of breaking into a system. But most attacks have more malicious intent such as stealing credit card numbers, social security numbers or other personal data for immediate financial gain. Corporate intellectual property theft is also done by hackers to resell the information or on behalf of competitors. To ...
    Published about 8 years ago | Rated: +2
  • Rate

    How Can CCTV Surveillance Systems Improve Security?

     How Can CCTV Surveillance Systems Improve Security?
    Closed-circuit television (CCTV) surveillance systems have made tremendous technological progress in the last decade, not only in individual capabilities, but also in the ability to interface with other security technology. There are three primary ways to use CCTV systems, industry experts say: as a deterrent, for forensic purposes and as an interdictive device. Originally, CCTV surveillance systems were simply a deterrent. ...
    Published about 8 years ago | Rate This
  • +1

    Can Maryland Become the "Silicon Valley of Cybersecurity"?

    Can Maryland Become the "Silicon Valley of Cybersecurity"?
    GAITHERSBURG, Md. - Gov. Martin O'Malley said Monday he wants Maryland to be the outlining plans to put the state out front in developing an industry focused on securing computer systems from tampering. O'Malley, who has been discussing job creation plans to help lift Maryland out of the recession, joined four Maryland members of Congress at the National Institute of ...
    Published almost 8 years ago | Rated: +1