Columnist George Spafford says a recovery and business continuity plan may be all that stands between your company and disaster. Is yours good enough to keep the business afloat?
The Internet is a global public commons. As such, it is a resource that needs safeguarding to prevent its misuse and ultimate destruction.
If something knocks your system off line, will it immediately come back up and work as planned? If not, you've got some planning to do.
In an increasingly paperless age, it's critical to backup your data. If you're not doing so, or if you're not doing so correctly, you and your company could be in for a disaster.
Our columnist lays out a basic list, or menu, of security technologies and processes that business and technical folks should consider. Pick from the list based on your specific needs.
Small businesses worried about security should avoid magic-bullet solutions and look instead to multiple layers of defense.
IT is getting a wake-up call. Security problems are running IT managers ragged. They're wasting time and loads of money. But our Datamation columnist says security problems are merely the symptom. The root of the problem runs much deeper.
As companies push in new intrusion detection systems and patch-management policies, there's something that often gets overlooked. Change. And change can lead to the unknown. And if you're not thinking it through, it can lead to lots of problems.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?