Skip to content

12 Tips for a Stronger Password

By Michael Hall, Chief Information Security Officer Weak passwords are an easy way for someone to access your personal data. Use proper password techniques that are enforced for all user accounts, including those with remote access to your system. Here are some good tips to follow when creating passwords: Passwords…

Wi-Fi Enabled Children’s Toys: 5 Safety Tips

Now that the holidays are over and every present has been opened and tested, you may want to take a closer look at any new devices in your household. Run an online search for “Wi-Fi enabled children’s toys” and you’ll find pages and pages of tech toys to purchase, from…

New Safe Harbor Agreement Needed

U.S. businesses that handle personal and company data from overseas may face higher costs and stricter regulations due to a new European legal ruling that finds American law is too weak to protect online privacy. Last month, the European Court of Justice (similar to the U.S. Supreme Court) struck down…

Channel Partners: EMC Partner: Dell, EMC ‘Complement Each Other’

Originally published by Channel Partners. An EMC partner says it’s already reaping the benefits of Dell’s pending $67 billion acquisition of the storage company. Chris Bross, CTO of data-recovery provider DriveSavers, said the consolidation will allow solution providers affiliated with Dell and EMC to become a one-stop shop. DriveSavers’ Chris Bross: “From the perspective…

Cybersecurity Infiltrates e-Discovery Managed Services

Originally published by Legaltech news. Security is a top agenda when law firms select EMS vendors By Monica Bay, Legaltech News Law firms, corporate counsel and other organizations face increasing challenges when deciding how to handle electronic data discovery. It’s expensive, challenging and often unpredictable. Over the last decade, e-discovery options…

Protect Your Android Phone from App Attacks

If you use an Android phone, please take this advice­—now For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For…

New Malware Implodes on Detection, Taking Your Data Down

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed…

Back To Top
Search