- Welcome Guest
- Sign In
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...
During the pandemic, increasing numbers of people have pulled out their sewing machines and knitting needles and gotten to work. A massive resurgence in sewing and crafts has taken place, as makers around the world have been sewing masks and creating other much-needed items for themselves and others...
A recent study found that businesses across North America are led well and staffed with people who are engaged in what they're doing. But technology is barely adequate -- and because of this, managers should devote their attention to improving systems whenever they think about how to improve overall...
Artificial intelligence will play a major role as we try to move to a post-pandemic world, especially as it pertains to tracking people's health and wellbeing in public areas. Employers will tap technology solutions to help them face challenges such as adhering to new rules and regulations, monitori...
There has been a lot of debate in the public sphere around the degree and kind of legal regulation a society should apply to online speech. While the dialogue has become more intense and urgent in the last few years, the effort to impose limits on Internet speech has been contentious from the start....
Online medical appointments have become commonplace during the pandemic, and they're likely to continue into the future, even as in-person medical visits resume. The convenience, accessibility and cost-effectiveness of telemedicine will make it a vital part of comprehensive medical care in the digit...
Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversa...
By necessity, almost all education is happening online at the moment, but the trend likely will continue even after the COVID-19 pandemic is over. Online learning is often more convenient than in-person training, and because the methods and techniques for online education are evolving and improving,...
How do you know if you are at risk of being hacked? Like conventional criminals, criminal hackers choose easy and lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after data one use...
Cracked or broken mobile device screens can be costly to fix, but a few inexpensive do-it-yourself strategies can eliminate a repair shop visit and salvage your tablet or phone. It is relatively easy and cheap to replace the glass on a phone once you get the hang of it. Tablets are a bit more involv...
More than any other factor, it is our asset that determines the kind of adversary we face. For most of us, our asset is the corpus of sensitive personal details consequent to online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze ...
At this point, remarking that people now are more concerned about online privacy than ever before is not a novel observation. What's fascinating, though, is that interest in personal digital security has remained high since the issue exploded about seven years ago. In other words, instead of experie...
In this uncertain and increasingly homebound era, customers are turning online for everything from groceries to cat food. It's more important than ever to make sure that websites are optimized for the highest-possible customer engagement and conversion. E-commerce optimization is one game that compa...
As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't ...