Security 2012 Articles

Popular Security Articles for 2012

Forwarding Work Email to Personal Gmail Could Be Dangerous

Employees could be putting their business\’ security at risk whenever they forward an email from a company account over to their personal Gmail accounts, according to a SearchConsumerization report. As[...]

What Makes a Business Notebook a Business Notebook?

The term \"business notebook\" meant something ten years ago. Even though the lines have been blurred, there are still features that device a business laptop.

The Always On Employee: What Does MDM Mean for Me?

Are you a bring your own device (BYOD) rebel rouser? A freewheeling employee using whatever mobile device suites your computing style whenever? If so, it\’s important to know about mobile[...]

The Great Reinventors: Best & Worst Tech Company Rebranding Efforts

A brand defined as a complex set of inter-related components that overall set an expectation for a customer experience. A brand involves the name the logo, the colors, the tone,[...]

QR Codes Pose Security Risk, Becoming Obsolete Experts Claim

QR codes have pre-dated their most common usage cases by decades, and just as we are getting to know them, some pundits are predicting the demise of the blocky scanner[...]

Netgear R6300 Review: The World\’s Fastest Router?

Still being developed at the time of the review, the new IEEE 802.11ac standard is the future of wireless networking technology and is making waves in the world of wireless[...]

What Does 802.11ac Mean For Business?

802.11ac is the latest Wi-Fi standard, which promises blazingly fast Wi-Fi speeds. TechnologyGuide looks to separate its promise from reality, and figure out what it means for businesses.

FBI Ransomware Scam Affecting Thousands

The FBI is warning users about a malicious ransomware scam that freezes infected computers and falsely threatens law enforcement action if users do not pay non-existent fines. Reveton, a Trojan[...]

Addonics CipherUSB Review: Super Easy Security

The Addonics CipherUSB is a great device for users looking to encrypt their external storage devices. Really, you need to read up on how this simple USB device is both[...]

Samsung Printers Have Hidden Security Exploit

The United States Computer Emergency Readiness Team (US-CERT) has reported a security vulnerability in various Samsung printers and Dell-branded printers manufactured by Samsung that could allow an attacker to remotely[...]

The Technologies of Tomorrow: EmTech 2012 at MIT

We\’ve seen the future… or at least what the engineers and innovators at the companies that will be driving it in areas such as energy, communications, entertainment, and data think[...]

SanDisk to Invest $75 Million in Flash Memory Startups

SanDisk today launched a venture capital fund that will see the data storage company make investments in startup companies focused on \”innovative solutions\” in flash memory. Dubbed SanDisk Ventures, the[...]

BYOD and Cloud Storage: A One Two Punch to Enterprise Security

Today, the advent of the cloud and the proliferation of inexpensive hand-held mobile devices has changed everything. And corporate security personnel are scrambling for ways to make sure these[...]

BYO Security Threat: Empowered Employees Able to Ignore Policies in BYOD Era

The self-empowered BYO employee is as compelling to businesses as the proposition is terrifying. With a massive BYO movement afoot, organizations are scrambling to figure out how to reap the[...]

Samsung Working to Fix Security Hole

Samsung has acknowledged the existence of a security vulnerability in many of its leading devices, and says that it is currently working on a software update that will resolve the[...]

BYOD? Try BYOA, New Study Suggests

The \”bring your own device\” movement — or \”BYOD\” for short — has been discussed ad nauseum in IT circles over the past few years, and with good reason: more[...]

How to Keep Your Network Secure

When it comes to network security, small to medium-sized businesses (SMBs) find themselves in a unique spot. They can’t afford the same kind of security luxuries that bigger-budget large businesses[...]

BYOD the New Cost-Effective Norm, But There are Considerations

Bring your own device, or BYOD, is one of the hottest – and most important – trends of the year.  However, the word \’trend\’ doesn\’t really begin to describe what\’s[...]

Tablet Security Focus Shifts from Software to Hardware

by Paul Korzeniowski Security has been an ongoing concern with tablets. Recent moves by Apple Inc. illustrate a potential change in emphasis, with device suppliers incorporating more hardware based security[...]

IT Execs Cautious About the Cloud, But Compelled By Cost-Saving Benefits

In this presidential election year, consumers and business people alike may claim that the candidates and their respective followers may have their head in the clouds when it comes to[...]