Article Trunk



Archive for the ‘Enterprise Security’ Category

Do You Have the Right to be Forgotten?

07.14.2016 · Posted in Enterprise Security

Google lets you search for links to third party information. Some of that information may contain personal data. If you see incorrect information linked to you, do you have the right to have Google remove it? Read on regarding the case of the ̶... ...

How to Avoid Ransomware

06.30.2016 · Posted in Enterprise Security

Open up any tech related site and you’re bound to see a new article on the prevalence of ransomware. How can you protect yourself against this despicable act? Read on to find out. What Is Ransomware? Ransomware is a type of malware that o... ...

Will Passwords Soon Be a Thing of the Past?

06.03.2016 · Posted in Enterprise Security

Google has set its sights on killing the user password… at least on Android devices. Big news from the Google I/O event as Google has unveiled the Trust API, which allows developers to use sensor and biometric data for authentication. What... ...

Apple vs. FBI Showdown – What Does This Case Mean to You?

03.09.2016 · Posted in Enterprise Security

The FBI wants Apple to break a security feature on a terrorist’s phone. Apple says it will threaten every iPhone user out there. What’s happening and why should you care? Read on to find out! In the showdown between the FBI and Appl... ...

Making Computer Security Personal: Social Engineering and Password Theft

11.04.2015 · Posted in Enterprise Security

How secure are your passwords? Learn how every day events can pose risks to your digital security Date: Late 1980s Scenario: You answer your phone talking to a person who identifies themselves as an agent of the phone company. He tells you that you... ...

Top Five Network Admin Apps

10.22.2015 · Posted in Computer Articles, Enterprise Security

Working as a computer network admin means you have a lot of responsibility in keeping your employer's lines of communication open. Here are five apps that can make your job a lot easier. In my experience, I've found the following five apps to be the most hopeful in working as a computer network administrator. 1. ...

Cyber Security: Network, Mobile, Cloud and Password Prevention

07.07.2015 · Posted in Computer Articles, Enterprise Security

The article highlights how you can make your business network, business devices, and storage all more secure. Cyber security is growing more important are people are sacrificing security for convenience. With these tips, you can bulk up your security t... ...

Why Use a VPN?

02.23.2015 · Posted in Computer Articles, Enterprise Security

Simply put, a Virtual Private Network (VPN) enables remote access to a group of networked computers through a public interface, such as the Internet. VPNs are often used by businesses and schools to grant authorized employees or students access... ...

How to Turn off BitLocker To Go Encryption

12.22.2014 · Posted in Enterprise Security

If you decide you no longer want or require encryption on your removable media, you can disable BitLocker To Go. Learn how to reverse encryption and return your data to its original state. BitLocker To Go encrypts removable drives with AES 128-bit (or ... ...

How to Strengthen BitLocker Encryption to 256-Bit

12.10.2014 · Posted in Enterprise Security

If you are highly concerned about security, you might be pleased to discover that Microsoft gives you the option of enabling 256-bit AES encryption, which increases the number of possible key combinations from 2128 to 2256. Learn how to change encrypti... ...