My Queue

There are no Videos in your queue.

Click on the Add to next to any video to save to your queue.

There are no Articles in your queue.

Click on the Add to next to any article to save to your queue.

There are no Podcasts in your queue.

Click on the Add to next to any podcast episode to save to your queue.

You're not following any authors.

Click the Follow button on any author page to keep up with the latest content from your favorite authors.

Data Security

Cybersecurity

More Than 150,000 U.S. Small-Business Websites Could Be Infected With Malware at Any Given Moment. Here's How to Protect Yours.

Small-business victims were involved in 43 percent of data breaches over the course of a year, according to a recent report.

Your Data Might Be Safe in the Cloud But What Happens When It Leaves the Cloud?

In the age of data breaches, companies have a responsibility to safeguard sensitive information. Entrepreneurs can protect data during transactions by taking 4 simple steps.

3 Cybersecurity Tips for Entrepreneurs

Cybersecurity is key to any successful business. Here are three basic tips for getting started.

A Regulatory Tsunami Is Coming: Are You Prepared?

Compliance will be an increasingly challenging business issue in 2019. Consider the 'Office of Compliance' that Xerox already has to deal with the complexity.

More From This Topic

Apple

Apple Took Out a CES Ad to Troll Its Competitors Over Privacy

In a world where privacy is on everyone's mind, Apple is saying to the technology industry that it stands alone.
Data Security

Microsoft's Project Bali Seeks to Give You Control of Your Data

'With Project Bali, we propose a new personal data bank which puts users in control of all data collected about them,' the project's website says.
Data Security

Your Data Is Useless If You Don't Have a Management Strategy

Data is mostly a raw material. You need a strategy to make something out of it.
Cybersecurity

Security Trends Your Company Needs to Embrace in 2019

IT innovations create risk until new cyber security solutions, like AI and authentication, rise up to meet the challenges they present.
Technology

Google Home and Amazon Echo Can Store Your Voice Recordings. Here's When They Could Be Used Against You.

There are instances when the government or other authorities can access your smart home assistant data. Here's how the devices work -- and how to delete recordings.
3 Things To Know

60-Second Video: Who Won the Mega Millions Jackpot?

Here are three things entrepreneurs should know today.
Apple

Here's How to Download Your Apple Data

On Wednesday, Apple began allowing its U.S. users to download their personal data, such as app usage history, calendars, photos and more. Here's how.
Technology

Check Yourself Before You Buy Exciting Tech You Don't Really Need

Not every technology is right for your business.