At a time where state actors have working exploits that target smart TVs and undisclosed zero-day exploits of fully patched PC and smartphone platforms, there is no question that practicing safe computing is more important than ever. While there is no silver bullet for you to protect yourself against constantly evolving security threats, there are some steps you can take to reduce your likelihood of being a victim in this age of insecurity.Good online habits
For all the sophistication of modern exploits, the traditional warning about how files haring is a hotbed for malware is as valid today as ever. It is a good practice not to download and run software from untrusted online sources or via peer-to-peer networks. Hackers have been known to take legitimate software and infect it with malware before distributing it to the unsuspecting. Some even take the extra step of removing copy protection on licensed software to sweeten the bait.To read this article in full or to leave a comment, please click here(Insider Story)
At a time where state actors have working exploits that target smart TVs and undisclosed zero-day exploits of fully patched PC and smartphone platforms, there is no question that practicing safe computing is more important than ever. While there is no silver bullet for you to protect yourself against constantly evolving security threats, there are some steps you can take to reduce your likelihood of being a victim in this age of insecurity.To read this article in full or to leave a comment, please click here(Insider Story)
Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here
Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here
NOTE: This story was originally published in September 2013 and updated in April 2017.Bringing IT in-house and setting up dedicated on-premises servers can be intimidating for a small business, especially given the recent focus on online services. Moreover, resources designed to help tend to assume a medium-sized or enterprise installation, which may not necessarily work well for setting up a small server room or even a closet for a branch office.With some understanding of the basics, though, setting up your own server room for your small business network need not be an arcane process. Here are some tips for getting started.Rack-mount equipment makes sense
It's not uncommon for small businesses to begin operation by stacking server hardware and network appliances on a desk or shelf. Though such a deployment is inexpensive, the pile of equipment invariably expands into an unmanageable mess with the growth of the company. Exposed equipment is also completely open to physical tampering and is a ticking time bomb for accidents such as coffee spills, dust or even workers tripping over wires.To read this article in full or to leave a comment, please click here
NOTE: This story was originally published in September 2013 and updated in April 2017.Bringing IT in-house and setting up dedicated on-premises servers can be intimidating for a small business, especially given the recent focus on online services. Moreover, resources designed to help tend to assume a medium-sized or enterprise installation, which may not necessarily work well for setting up a small server room or even a closet for a branch office.With some understanding of the basics, though, setting up your own server room for your small business network need not be an arcane process. Here are some tips for getting started.Rack-mount equipment makes sense
It's not uncommon for small businesses to begin operation by stacking server hardware and network appliances on a desk or shelf. Though such a deployment is inexpensive, the pile of equipment invariably expands into an unmanageable mess with the growth of the company. Exposed equipment is also completely open to physical tampering and is a ticking time bomb for accidents such as coffee spills, dust or even workers tripping over wires.To read this article in full or to leave a comment, please click here
Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space.A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here's a look at some of the top VPNs for privacy and security.To read this article in full or to leave a comment, please click here
Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space.A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here's a look at some of the top VPNs for privacy and security.To read this article in full or to leave a comment, please click here
Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space.A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here's a look at some of the top VPNs for privacy and security.To read this article in full or to leave a comment, please click here
The coworking and open-workspace revolutions are upon us.Many modern offices have already switched to open-plan concepts, and dedicated coworking spaces continue to become more and more popular. The general idea is to move office workers from their fixed cubicles to more open environments, to encourage interaction and collaboration. And coworking spaces let employees work from their locations of choice.Today, the sight of workers moving around throughout the day with their laptops is common, and they often huddle with different groups. But how can employees remain both productive and secure in such environments? Here are some basics for anyone who's new to an open office or cowork space.To read this article in full or to leave a comment, please click here
A peek inside a typical small business today will likely reveal lots of wireless devices, with little, if any, wired hardware in evidence. Problems could occur, however, if the small business deploys consumer-centric access points targeted at home users.To read this article in full or to leave a comment, please click here(Insider Story)
Cloud storage is an indispensable tool in today's hyper-connected world. But unlike the early days of cloud storage, when vendors regularly rolled out new capabilities and routinely bumped up storage limits, the market has matured in terms of capabilities and storage norms. Here are some key factors to consider before choosing a new cloud storage service.Getting started with the cloud
One of the first things you should do when choosing between cloud services is compare storage options, features and costs. Free offerings might work if you need only the basics, but some of the most important or advanced capabilities are available only via paid plans. Some cloud services offer very limited storage space for free, and some offer none at all.To read this article in full or to leave a comment, please click here
Does your home office Wi-Fi router's lackluster performance hamper your productivity? Do you constantly deal with wireless connectivity issues that drive you crazy? And do the problems get worse as you add more wireless devices to the network? If you answered yes to any of these questions, an upgrade of your aging, overloaded Wi-Fi router may be the only guaranteed solution.Before you buy that bargain basement router or even splurge on the most expensive model, it's wise to make sure you understand the technologies behind your in-home wireless so you can pick the best router for your workspace or small office.Making sense of Wi-Fi standards and technologies
Mobile devices that support Wi-Fi today conform to the 802.11 family of protocols for wireless communication. That family includes the trusted 802.11a, 802.11b and 802.11g standards, and newer Wi-Fi devices support the much faster 802.11n and 802.11ac, as well.To read this article in full or to leave a comment, please click here
Does your home office Wi-Fi router's lackluster performance hamper your productivity? Do you constantly deal with wireless connectivity issues that drive you crazy? And do the problems get worse as you add more wireless devices to the network? If you answered yes to any of these questions, an upgrade of your aging, overloaded Wi-Fi router may be the only guaranteed solution.Before you buy that bargain basement router or even splurge on the most expensive model, it's wise to make sure you understand the technologies behind your in-home wireless so you can pick the best router for your workspace or small office.Making sense of Wi-Fi standards and technologies
Mobile devices that support Wi-Fi today conform to the 802.11 family of protocols for wireless communication. That family includes the trusted 802.11a, 802.11b and 802.11g standards, and newer Wi-Fi devices support the much faster 802.11n and 802.11ac, as well.To read this article in full or to leave a comment, please click here
The nature of work has evolved rapidly during the last few years. Modern coworkers often have very different roles and responsibilities, and many work from multiple locations. Email is no longer an efficient tool for many of the tasks today's professionals perform, and face-to-face meetings are increasingly a rarity.Fortunately, a new generation of cloud-based collaboration tools are now available to help tackle some of these challenges. Here's a look at nine of the best options.1. Toggl for time tracking
If you've been turned off by the complexity of past time-tracking solutions, Toggl may be a better fit. The great-looking time tracker works in a web browser, and it's an intuitive tool that helps monitor your productivity. Toggl works offline, too, and it automatically syncs time tracked offline the next time it connects to the web.To read this article in full or to leave a comment, please click here
Hotels are digitally dangerous places these days. And that's not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years.Most of the earliest reports pointed to surgical strikes on high-profile executives or representatives of government agencies, but they could prove to be precursors for more wide-ranging attacks on the general public. Modern business travelers, with their treasure troves of files and personal information, will be prime targets, and they're also more likely to let their guard down after an exhausting journey.To read this article in full or to leave a comment, please click here
Must-have smart gadgets for your small officeImage by ThinkstockAre you setting up a new small office? Simply looking to revamp an existing location with some spiffy "smart" automation technology? We combed through piles of today's novelty IoT tech to find practical gadgets that can transform your workspace into a smart office that's sure to be the envy of all your coworkers and clients.To read this article in full or to leave a comment, please click here(Insider Story)
You've likely heard all about "crypto ransomware," or simply "ransomware," a specific type of malware that attempts to hold your digital existence hostage by encrypting personal files and then offering decryption keys in exchange for payment. When the malware first takes root, it shows no outward signs that anything is wrong. Only after the malware does its nefarious work in the background are you presented with the ransom, typically via demands for Bitcoin or other forms of digital currency.Some early ransomware was riddled with software bugs that made it possible to recover encrypted files that had been held hostage, but newer variants that use robust symmetric and asymmetric encryption are much more troublesome. (Symmetric encryption is typically used to rapidly scramble files, and the asymmetric encryption can then be applied to the original symmetric keys so data can only be recovered by cybercriminals with the appropriate private keys.)To read this article in full or to leave a comment, please click here
You've likely heard all about "crypto ransomware," or simply "ransomware," a specific type of malware that attempts to hold your digital existence hostage by encrypting personal files and then offering decryption keys in exchange for payment. When the malware first takes root, it shows no outward signs that anything is wrong. Only after the malware does its nefarious work in the background are you presented with the ransom, typically via demands for Bitcoin or other forms of digital currency.Some early ransomware was riddled with software bugs that made it possible to recover encrypted files that had been held hostage, but newer variants that use robust symmetric and asymmetric encryption are much more troublesome. (Symmetric encryption is typically used to rapidly scramble files, and the asymmetric encryption can then be applied to the original symmetric keys so data can only be recovered by cybercriminals with the appropriate private keys.)To read this article in full or to leave a comment, please click here