Itscolumn - itscolumn.com - IT Security Column

Latest News:

White House Appoints McAfee CTO to Cybersecurity Post 22 Aug 2013 | 06:56 pm

The Obama administration officially selected a senior executive from McAfee to be the Department of Homeland Security’s top cybersecurity official. Phyllis Schneck, a vice president and CTO for the p...

Dropbox Alternatives for Security, Affordability & Collaboration 20 Aug 2013 | 07:07 pm

A revolutionary change has been brought in the world of “exchanging information” by companies such as Dropbox. Small business enterprises have derived the most benefit from the abundance of Dropbox fe...

Cybercriminals Increasingly Target Small Businesses. 23 Apr 2013 | 08:43 pm

A recent data breach investigations report from Verizon shows that small businesses continue to be the most victimized of all companies. Is this because there are many more smaller businesses than lar...

Why CyberBunker Was Blacklisted By Spamhaus 3 Apr 2013 | 06:35 pm

Recently we witnessed the real power of cyber-attacks when the anti-spam organization Spamhaus was hit by a number of large-scale distributed denial of service (DDoS) attacks, which not only brought d...

Key Considerations for Your IT Security Management Checklist 19 Mar 2013 | 05:48 pm

As we move into 2013 organizations are likely to see increased regulatory compliance requirements, growing private and hybrid cloud implementations, software-defined data center consolidation, Bring Y...

IT Consulting Companies Turn to the Cloud for Antivirus Solutions 28 Feb 2013 | 02:24 am

By Deepika Dhatia These days, everything is moving to the cloud, from picture storage to sales databases and from email to software. Oftentimes, small and medium-sized businesses find they can get mor...

Top Malware Threats of 2013 14 Feb 2013 | 11:01 pm

Cybersecurity. We now know the numbers. The war on cybercrime continues for most organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web atta...

Remodeling and Home Security 14 Feb 2013 | 09:38 pm

Is it time to spruce up the ol’ house? Are you thinking of a complete remodel? Just want to update that dilapidated kitchen? Either way, indicators of a remodel (contractors working, sounds of tools, ...

Access to Corrupted OST files in Minutes. Know How. 8 Feb 2013 | 12:37 am

Talking about MS Outlook OST files, the best aspect that I always admire about them is it empowers you to carry out offline work very effectively. In fact, it facilitates you to work offline and then ...

How Losing Your Phone can Mean Losing Your Identity 8 Feb 2013 | 12:18 am

In the age of technology, there are more way than ever to steal a person’s identity. It doesn’t take someone with an IT job to do it these days. A lost phone, and especially a smartphone, is a goldmin...

Recently parsed news:

Recent searches: