dcsimg

Articles by Laura Taylor 

Laptop Encryption Improves Mobile Security

Unencrypted laptop thefts are often the source of major data breaches. One simple solution: hardware-based, self-encrypting drives for laptops.

Security Awareness and Training 101

Security awareness and training are perhaps the most overlooked parts of your security management program. Why is security awareness and training so important and what constitutes a security awareness and training program?

Learn the Basics of Handheld Security

While PDA and smartphone security is often a forgotten piece of the security infrastructure, these devices have the ability to transmit and receive viruses, and can be exploited in numerous ways. In this article, the first in a series on the subject, we provide a general overview of PDA security and discuss vulnerabilities, products, security issues, and policies.

Simplify, Save With Single Sign-On

Single sign-on has evolved as a cost-savings solution to minimize support calls and to simplify the administrative process of authentication and authorization. Here's a look at how it works.

How to Choose the Right Enterprise Firewall

Shopping for an enterprise firewall can be a daunting task. However, with a little background knowledge, an understanding of firewall features, and knowing what questions to ask the vendors, you'll end up with just the right firewall for your organization.