6 Tips for Safe Remote Computing

We put the best security capabilities we can into our products, but we can't do it all. You should be aware of other products and - more importantly - safe practices that thwart the common cyber attacks that victimize innocent users. In a previous blog post, we talked about password security and password managers. Here we discuss other important security measures you can and should …

Advertisements

Cryptolocker: How to avoid it and steps if you are infected

CryptoLocker is a ransomware trojan that encrypts data files on infected computers and  then asks for money should users wish to restore them. Email is the most common mechanism of getting this type of virus, whose actual payload is often hidden. For example, you can get an email containing: An executable file, with either .EXE, .COM or …

The Case for an On-Premises Email Filter, or “Don’t You Touch My Junk!”

Outsourcing your spam filtering has advantages, but requires you to trust all your email to an unknown third party. Do you really want to do that? Think about the kinds of things that are in your organization's email: Personal details of you and your employees, details of your customers and your business with them, sensitive financial information …

How to Build Your Own Private Cloud Storage Server for under $1000

With the increasing threat of cyber attacks, theres plenty of opportunity for your data to be compromised. And it is possible to experience data loss. However, if you implement a security plan and backup your data, there is no reason to stress such attack. Storage and bandwidth are so cheap these days that there is no …