By Vic Hargrave A Question for Vic: Vic’s Answer: Hi, Julie. Thanks for your question. As you probably know, iYogi.com is an online PC support service. To check them out I first ran http://www.yogi.com through Trend Micro’s Site Safety Center http://global.sitesafety.trendmicro.com/ where you can get free URL ratings from us. Our URL rating service…
Read More
Earlier this month, hackers reportedly broke into a U.S. water utility computer network and destroyed a pump using a relatively simple attack.
Read More
The healthcare industry is emerging as a leading advocate for the use of smartphones and tablets in the workplace, but the sensitive nature of the data carried on these devices heightens the importance of effective mobile security practices.
Read More
Much of the information produced and stored on the networks of U.S. government agencies holds the key to national security and the country’s operations.
Read More
The fragmented, leaderless nature of Anonymous may lead to the cybercriminal collective’s ultimate undoing.
Read More
Many businesses are still not comfortable with the idea of storing sensitive and mission-critical data in the cloud, even as more experts claim that cloud-based services can provide equal, if not better, data protection than most on-premise solutions.
Read More
Traditionally, the responsibility of protecting company information has fallen on the chief information officer and the IT department.
Read More
A group of patients filed a class-action lawsuit against Sutter Health this week, after it was revealed a laptop containing information on more than 4 million patients was stolen from the headquarters of the Sutter Medical Foundation (SMF) in Natomas, California.
Read More
Hackers are targeting their cyberattacks to exploit various vulnerabilities, resulting in malware infections, data breaches and persisting news headlines that highlight the current state of affairs for cybersecurity.
Read More
Efficiency, scalabality and affordability have traditionally been the primary business drivers for data center virtualization. However, if managed correctly, companies may soon discover the true benefit of the technology is actually enhanced security.
Read More