I write articles about Windows, IT security, certifications and the like, and develop online and on-ground courses.
An insider threat – someone inside your network who is maliciously or accidentally causing havoc – is one of the most dangerous risks facing organizations today. Find out how to prevent or deter damage from an insider threat using both no-tech and high-tech solutions.
Image Credit: Sergey Nivens/Shutterstock
In the offices of today's small and midsize business, you might find a vast array of smart devices, such as printers, cameras, utility sensors and door locks, all of which can communicate with other devices through wireless connections. Even the staff break room is beginning to benefit from next-generation technologies, such as smart refrigerators and smart coffee makers.
Image credit: LeoWolfert/Shutterstock
Looking for a career change in the new year? There's no better time to consider a career in cybersecurity: U.S. businesses and government agencies are spending billions of dollars each year to protect their data and assets from malicious attacks, with Forbes reporting that $170 billion will be spent worldwide by 2020.
Image credit: Rawpixel.com / Shutterstock
Encryption is a difficult concept to grasp, but it's a necessary part of protecting your business's sensitive data. At a basic level, encryption is the process of scrambling text (called ciphertext) to render it unreadable to unauthorized users. You can encrypt individual files, folders, volumes or entire disks within a computer, as well as USB flash drives and files stored in the cloud.