In securing the computers of the small or home office, it is important to consider the physical security of the machines themselves, as there are many threats that do not come from the Internet, but, rather, come from someone having physical access. If there is any...
Continuing our examination of the security needs of the small office, let’s look at configuring the existing security options that are built into the operating system (OS) and programs that you use. Whether you use a Microsoft Windows operating system, Apple OS...
Last week, we looked at some of the network and Internet security needs of the small office/home office (SOHO, in computer business lingo). Whether you have one employee, or ten thousand, you need to have a formal security policy as part of your overall security...
The security needs of the individual Internet user, and those who work in small or home offices, often overlap in many areas. Just as there are many different ways to get to Chicago, there are many different ways to set up small computer networks. Methods to provide...