If you bought a car, and it broke down and exploded, would you buy the same make and model, again? Well, OK, so maybe you would. Maybe you would think its problems were just a fluke, and surely couldn’t happen, again. But if your second same-make-and-model car...
Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...
Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...
“Critical Security Controls,” a phrase coined by the Center for Internet Security (CIS), is a high-tech, nerdy way of saying, “super-important things you really, really, really, really need to do.” They’re not kidding around, either; you really do need to do them. The...
I am often asked, “Is Facebook safe?” Facebook, the most popular social networking website in the world, claims almost 30 percent of the world’s population as members. Just like the world’s population, it can be both safe and dangerous at the...
Page 8 of 9« First«...56789»