Translate this page using the Google Translator button above!
IT Specialist Blogs
Interested in Blogging on IT Specialist.com? Please contact us!
Gain Insight from Industry Leaders Interviewed by IT Specialist.com
Over 6,000 Members
On Demand Archives (Webcast)
Contributor Columns on Information Technology and Security
More and more companies are now using cloud storage. Using the cloud for your storage does affect the security of your data, but how? 61% of SMBs believe their data in unsafe in the cloud, why? And what can they do about it?
SMBs are concerned about their data stored ...
Imagine a lifeguard at the beach sitting on his perch. His job is to patrol and monitor for signs of trouble. He sees a surfer being attacked by a shark. Wow, a lot of good it does that he’s in a completely helpless position; by the time he scrambles ...
Not all computer viruses immediately crash your device in a dramatic display. A virus can run in the background, quietly creeping around on its tip-toes, stealing things and messing things up along the way. If your computer has a virus, here’s what may happen:
Windows suddenly shuts down.
Programs automatically start ...
What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up ...
Do you have employees who bring mobile phones to work and use those devices on the corporate network? Do they store company data on these “Bring Your Own Devices (BYOD)”?? Does your company have a policy in place for this?
First, the moment a person brings in their personal phone ...
Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments.
An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, ...