by ray | Feb 7, 2015 | Security
Article by John D. Sutter Maybe you got the email, too? It landed in my inbox at 1:58 a.m. on Thursday. “To Our Members: Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art...
by ray | Feb 6, 2015 | Security, Tech News
You may have worked in the cloud if you’ve ever created and shared a homework document in Google Docs, been on a project team in Basecamp, or used customer relationship management software like Salesforce. Or maybe you regularly dump your photos into Flickr,...
by ray | Feb 5, 2015 | Cloud Tools, Security
Article by Marlene M. Maheu, Ph.D. As computer hard drives are getting overloaded with information, behavioral professionals are beginning to wonder which companies to trust with their client/patient information. Many data storage companies have developed robust...
by ray | Jan 24, 2015 | Security
Article by Alan Henry Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can,...
by ray | Jan 19, 2015 | General News, Security, Wordpress
Article by Larry Seltzer For some time WordPress, the popular blogging platform, has been one of the major attack target platforms on the web. A compromised site can deliver malware to users and be used to sell illicit goods, among other nefarious uses. Some users are...
by ray | Jan 19, 2015 | General News, Security
Article by Steve Herrod former CTO and SVP of R&D of VMware As we bear witness to the aftermath of major attacks this year against the likes of Target, Home Depot, Neiman Marcus and most recently, Sony, it becomes clear that we are entering an entirely new “war”...