Security Articles

Most Popular Security Articles

Email Showdown: Gmail vs. Yahoo! vs. Outlook vs. the Field

Free email clients are a dime a dozen these days, but how do you know which one will best fit your needs? Let\'s take a look.

How To Set Up an Inexpensive Home Security System

There are plenty of inexpensive options when it comes to monitoring your home while away on vacation.

Emerging Tech Drives SMB Home-to-Office Telecommuting Activities

By all indications, small-to-medium size businesses are on the move, in more ways than one.

VIDEO: Netgear Genie – Manage All Devices On Your Network With Ease

NetGear had its NetGear Genie on display at CES 2013, a router management device for home or small offices. TechnologyGuide was in Vegas to take a closer look.

How to Secure Your Home Wireless Network

Most homes have a wireless network these days, but many people are not taking the necessary steps to ensure their network remains secure. Read more to find out how to[...]

Thinx 4G LTE Camera with Smart Alert App: Intelligently Monitor your Home or Business

Thinx takes a unique approach to remote video monitoring for homes and small businesses by letting users set SMS alerts for specific times of day or events, which they can[...]

Forwarding Work Email to Personal Gmail Could Be Dangerous

Employees could be putting their business\’ security at risk whenever they forward an email from a company account over to their personal Gmail accounts, according to a SearchConsumerization report. As[...]

Small Office, Home Office Solutions

Over the past few years, the number of people who work from home or from a small office has been growing substantially. The United States easily has the highest percentage[...]

Working in the Cloud: Road Warrior iPad Apps & Accessories

Businesses are cloud bound, resulting in a more mobile and productive workforce. TechnologyGuide takes a closer look at this trend, with the a focus on the end-user. What does it[...]

What is Two-Step Verification? How Do You Set it Up?

What is two-step verification and how can it help you from being the victim of online identity theft?

What Makes a Business Notebook a Business Notebook?

The term \"business notebook\" meant something ten years ago. Even though the lines have been blurred, there are still features that device a business laptop.

OmniPeek Enterprise 7.0: Monitor And Manage Any Wireless Network

There’s a broad range of functionality in the latest release of OmniPeek from WildPackets, including a large number of tools that make it easy to keep wireless LANs on the[...]

LenovoEMC PX2-300D Network Storage Review

The LenovoEMC PX2-300D offers easy to use network storage for small businesses.

The Great Reinventors: Best & Worst Tech Company Rebranding Efforts

A brand defined as a complex set of inter-related components that overall set an expectation for a customer experience. A brand involves the name the logo, the colors, the tone,[...]

The Always On Employee: What Does MDM Mean for Me?

Are you a bring your own device (BYOD) rebel rouser? A freewheeling employee using whatever mobile device suites your computing style whenever? If so, it\’s important to know about mobile[...]

QR Codes Pose Security Risk, Becoming Obsolete Experts Claim

QR codes have pre-dated their most common usage cases by decades, and just as we are getting to know them, some pundits are predicting the demise of the blocky scanner[...]

Belkin Introduces NetCam with WeMo SMART Capabilities At CES 2013

Belkin announced yesterday at CES 2013 that it has developed upgrades to its NetCam, a wireless networking camera, including HD quality and WeMo SMART capabilities. The NetCam HD Wi-Fi Camera,[...]

Microsoft Offers Solutions for Legacy Apps with Windows 8

Microsoft knows businesses are weary about upgrading to Windows 8, which is why the company has incorporated plenty of solutions to help IT ensure compatibility with legacy apps.

Netgear R6300 Review: The World\’s Fastest Router?

Still being developed at the time of the review, the new IEEE 802.11ac standard is the future of wireless networking technology and is making waves in the world of wireless[...]

FBI Ransomware Scam Affecting Thousands

The FBI is warning users about a malicious ransomware scam that freezes infected computers and falsely threatens law enforcement action if users do not pay non-existent fines. Reveton, a Trojan[...]