Article Query: Data Security
October 5, 2011

Not long ago, the phrase portable secure storage did not mean a great deal to the average business traveler. Today, however, carrying large amounts of data, including application files, digital photos, and music, is a reality for most tech-savvy travelers. Whether you are on the go for business or personal reasons, you likely carry a large quantity [...]

July 4, 2011

33% of people use the same password for every web site they access.  62% do not use complex passwords or change their password frequently.  Of the nearly 75 million scam emails sent every day, 2000 claim a victim.  73% of Americans were the victim of some form of cybercrime.  25% of all cybercrime remains unsolved.  The [...]

July 3, 2011

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online.  As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not [...]

June 28, 2011

Microsoft is advising customers to reinstall if their desktop OS becomes infected with a new rootkit that hides in the PC boot sector.  This new variant of a Trojan Microsoft calls “Popureb” can infect the system at such a deep level that the only way to remove the malware is to reinstall Windows, Chun Feng, an [...]

June 17, 2011

For many of us in the technology field the preventative measures we take to keep ourselves and our systems safe online can become second nature.  We become comfortable with the drill, so comfortable, in fact, we sometimes forget that not everyone may have the resources and technical information that we have at our disposal.  Keeping this in [...]

April 6, 2009

In this multi-part series I will be discussing the adoption and integration of Linux in the Microsoft enterprise. Each article in the series will cover a different aspect of Linux and how each can be successfully deployed and supported in the enterprise to augment and compliment Microsoft technologies. Linux adoption in the enterprise data center [...]

March 22, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

February 19, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

February 6, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]

January 31, 2009

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest [...]