Date: 12 Mar 2013 | Posted BY: ulisticadmin
The Internet has become ingrained in nearly everything we do. There are many people who are barely disconnected these days. While this development is great for companies, that arguably get more out of employees as a result, there is a downside. In general, people are more than willing to share their personal and private information online. This can ruin reputations, or worse still, open you to ide
Date: 22 Feb 2013 | Posted BY: ulisticadmin
The number of tech gadgets we own has been growing, as has the number of criminals targeting high value goods like laptops and smartphones. While it is more likely to not happen, there is still a chance your laptop or phone could be stolen or go missing. When it does, you could lose important data, especially if you use this for your work too. To help increase the chances of finding your device yo
Date: 15 Feb 2013 | Posted BY: ulisticadmin
Social media has become a large part of both individual users' lives and company business. These platforms allow us to communicate with ease, while sharing information, and generally creating an interactive community. As with any group, security is an issue. We expect to be secure, but there are times when the security of your information could be breached. It only took one month for the first ma
Date: 07 Feb 2013 | Posted BY: ulisticadmin
The security of a company's networks and devices is a common issue many managers and owners face. There are a near constant stream of new threats brought to light, some of which are more important than others. The majority of the time these threats are to the software, but a recent one is hardware based and puts millions of systems at risk. At the end of January, numerous news and tech media servi
Date: 25 Jan 2013 | Posted BY: ulisticadmin
Technology surrounding the Internet is constantly evolving. Many programs that helped allow the Internet expand and become what it is today are still in use. They stay relevant by issuing updates that often bring more functionality while meeting the evolving needs of Web developers and users. One program, however, has had a number of security issues in the past year that have prompted experts and
Date: 10 Jan 2013 | Posted BY: ulisticadmin
Social engineering - the act of manipulating people into giving up confidential information - has long been a threat to businesses. One of the more common social engineering tricks, in terms of IT, is scammers posing as Windows technicians who call Windows users and try to trick them into believing their computers have viruses and that they need to pay to have the problem fixed. Have you had these
Date: 28 Dec 2012 | Posted BY: ulisticadmin
Security of a company's network and systems is big business. After all, you don't want your sensitive important information shared or stolen. While you take steps to ensure your systems are secure, there is one area you can't really control: social media. Hackers aren't stupid, and they have taken to these services in droves, looking to take advantage of unwary employees. It's important to develo
Date: 13 Dec 2012 | Posted BY: ulisticadmin
A common expectation of the younger generation entering the workforce is that the technology they use is unrestricted. They want to be able to access social networks, YouTube and personalize their systems by downloading favorite apps, backgrounds, etc. Many companies have obliged and just give all users administrative access to their computers. A recent survey however, has highlighted that this
Date: 30 Nov 2012 | Posted BY: ulisticadmin
One of the more ubiquitous devices of the modern era is the smartphone. We can do nearly everything on it, and as such it has played a large part in the blurring of the lines between work and life. While this is good for many businesses, many of these devices are largely unsecured, which can lead to problems, especially if the unsecured data is actually sensitive company information. One way to se
Date: 23 Nov 2012 | Posted BY: ulisticadmin
Spam can be a number of things. The original being canned spiced ham developed by Hormel in the 1930s. Due to food rationing in Britain during the Second World War, Spam became a popular menu item, so much so that it seemed to be everywhere, in every dish, whether you liked it or not. When the Internet was created and people started using email, we started getting emails that we didn't want, these