Security

News and Articles About Security

Three Tips for Using Public Wi-Fi Safely

Three Tips for Using Public Wi-Fi Safely

Here's how you can keep sensitive business information secure when logging online from public networks.
This Cloud-Based Storage Service Offers Deep Features for Businesses

This Cloud-Based Storage Service Offers Deep Features for Businesses

Egnyte's 'HybridCloud' can be a useful tool for companies that require extensive record keeping and more.
What Technologies Banks Should Be Using to Keep Your Money Safe

What Technologies Banks Should Be Using to Keep Your Money Safe

A look at security-related banking tools that guard your business from fraud.
What to Do If Your Business Gets Hacked

What to Do If Your Business Gets Hacked

Your network has been broken into. Now what? Here are six steps to clean up the mess and make sure it doesn't happen again.
How to Protect Android Smartphones From Cyber Attacks

How to Protect Android Smartphones From Cyber Attacks

A mobile security expert offers three tips for keeping sensitive personal and business data safe on the popular phones.
Three Issues to Consider Before Moving to the Cloud

Three Issues to Consider Before Moving to the Cloud

As more businesses are moving data online, here are some of the top security issues to examine before making the jump yourself.
Free Web Security Tools to Guard Your Business Browser

Free Web Security Tools to Guard Your Business Browser

Online security can be confusing and costly, but here are three free ways to keep your web browser as secure as possible in your business.
How to Protect Your Business's Mobile Devices

How to Protect Your Business's Mobile Devices

A look at software and apps that can help you track and manage company smartphones and tablets should they be lost or stolen.
Five Rules for 'Bring Your Own Device' Teams

Five Rules for 'Bring Your Own Device' Teams

As more employees use their personal smartphones and other tools for work, answering these questions can help determine if the risks might be worth the gain.
How Can I Protect My Cellphone from Hackers?

How Can I Protect My Cellphone from Hackers?

Technology evangelist Ramon Ray offers three tips for mobile security.
Cellphone Hacking: Could it Happen to You?

Cellphone Hacking: Could it Happen to You?

The cellphone hacking scandal that's captured recent headlines should also serve as a wakeup call. Here's how to secure your mobile phone.
What's in Store for Websites in 2011

What's in Store for Websites in 2011

From mobility to scalabilty, here's a look at the top trends in ecommerce for the coming year.
10 Data-Security Measures You Can't Do Without

10 Data-Security Measures You Can't Do Without

Using these simple methods can protect your business and your peace of mind.
Moving to Macs? Don't Forget About Security

Moving to Macs? Don't Forget About Security

Six steps small businesses can take to protect their Macs
Attacking Curiosity

Attacking Curiosity

Poisoning search terms with infected links is a new favorite hacker trick. Make sure your business doesn't fall prey.
How to Protect Remote Employees' PCs from Security Threats

How to Protect Remote Employees' PCs from Security Threats

If you're not careful, hackers could cost you the money you were trying to save in the first place.

Should You Farm out Your Data Protection?

Now, even your security can be handled by cloud computing software--but consider these factors before you get on board.

Social (Networking) Security

How to Keep your company safe from privacy leaks online

10 Tips for Home-Based Employee Computer Security

You're saving money by sending them home, but is the technology they use secure?

How to Plug Security Holes in Your Browser

To protect your browsing history, try the free private Browsing Feature in Apple's Safari or the Distrust add-on for Firefox. For complete anonymity, try the fee-based Anonymizer or the free Tor.

How to Stop Operating-System Attacks

Learn which antivirus pop-up ads may be fraudulent. Also, Mac users need security updates, too.

How to Safeguard Your Online Security

Use these tips to guard against security attacks related to your Facebook, MySpace, or Linked-In activity. Also, learn how some banks are making credit card shopping safer.

A Leash on Your Laptop

New tracking software monitors your missing laptop's whereabouts.

Just What Color Is a Security Hole?

Patch critical flaws in a color manager and IE. Plus: Opera, Office fixes.

5 Ways to Foil Hackers

Are you the only you out there? When it comes to protecting your identity, a bit of prevention is worth a megabyte of cure.

Connect with Entrepreneur

Most Shared Stories