How Do You Create and Manage Passwords?

How Do You Create and Manage Passwords?

Apr 14, 2014 | No Comments

Amer Alharbi wrote: What is the best way for you to creat a password and manage your password, for me I use 1password and I also write It in piece of paper. I’m glad you asked, Amer! I’ve discussed password creation and management many times over the years. However, now – more than ever before […]

Open Source Security Tools: A Practical Guide to Security Applications

Open Source Security Tools: A Practical Guide to Security Applications

Mar 21, 2014 | No Comments

Do you use commercially-available security options for your computer, or do you go with open source solutions? Read this free guide: Open Source Security Tools: A Practical Guide to Security Applications

Best Practices for Cloud-Based Recovery

Best Practices for Cloud-Based Recovery

Mar 11, 2014 | No Comments

What should you be looking for in a cloud-based recovery solution? Do you store everything up in those clouds? Read this free white paper: Best Practices for Cloud-Based Recovery

Evolution of IT Disaster Recovery

Evolution of IT Disaster Recovery

Mar 10, 2014 | No Comments

How has computer disaster recovery evolved over the years? Do you have a recovery plan in place? Read this free infographic: Evolution of IT Disaster Recovery

Layered Security: Why It Works

Layered Security: Why It Works

Mar 6, 2014 | No Comments

Are you using layered security for your computer? If not, why not? It’s definitely the best way to stay safe. Read this free report: Layered Security: Why It Works

10 Things Your Team is Afraid to Tell You About Your DR Plan

10 Things Your Team is Afraid to Tell You About Your DR Plan

Mar 2, 2014 | No Comments

Are you an IT manager? What does your disaster recovery plan look like — and will it really work? If you’re just a home user, do you even have a DR plan? You should. Read this free guide: 10 Things Your Team is Afraid to Tell You About Your DR Plan

Protection for Every Enterprise: How BlackBerry Security Works

Protection for Every Enterprise: How BlackBerry Security Works

Mar 1, 2014 | No Comments

Are you an IT pro in charge of the BlackBerry devices that your company uses? How do you manage security? Here’s a free guide you might want to check out: Protection for Every Enterprise: How BlackBerry Security Works

Quick and Dirty Subnetting

Quick and Dirty Subnetting

Feb 17, 2014 | No Comments

How much do you know about subnetting? It may not be your most favorite task, but every IT person needs to understand this concept. Read the free Quick and Dirty Subnetting guide!

Planning a Career Path in Cybersecurity

Planning a Career Path in Cybersecurity

Feb 3, 2014 | No Comments

Have you thought about a career in cybersecurity? Read the free white paper: Planning a Career Path in Cybersecurity

Practical Guide to Secure File Transfers

Practical Guide to Secure File Transfers

Jan 30, 2014 | No Comments

When was the last time you used FTP? If you transfer files with any frequency, then this free guide might be worth a peek. Read: Practical Guide to Secure File Transfers

Five DNS Security Risks That Keep You up at Night

Five DNS Security Risks That Keep You up at Night

Jan 10, 2014 | No Comments

Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

The Best Anti-Virus for Windows Computers

The Best Anti-Virus for Windows Computers

Jul 24, 2013 | No Comments

This is a sponsored post written by me on behalf of Vipre for SocialSpark. All opinions are 100% mine. Today I’m announcing the second winner of my giveaway for a one-year license to the 2013 edition of VIPRE Internet Security. I already gave away a license to a lucky LockerGnome reader who had commented to […]

Computer Security That Doesn’t Slow Down Your Computer

Computer Security That Doesn’t Slow Down Your Computer

Jul 8, 2013 | 19 Comments

This is a sponsored post written by me on behalf of Vipre for SocialSpark. All opinions are 100% mine. Last week I installed a better Internet security application than I’d been using on my Windows test system. As I described at the time, VIPRE Internet Security 2013′s installation process was clear and simple, and my […]

How To Stay Secure While Using Social Media

May 27, 2011 | No Comments

Add to iTunes | Add to YouTube | Add to Google | RSS Feed Is location-based social media an incredibly innovative technology that will garner relationships and bring them to the real world, or a creepy way to help evildoers find out where you are, or where you aren’t? One thing is for sure, this […]

Apple Finally Releases Fix for Mac Defender Malware

May 27, 2011 | 12 Comments

Apple was silent for far too long on the matter of the Mac Defender Malware, a Rogue anti-virus application like those seen on Windows machines for the past few years. This type of malware tricks users into thinking they are protecting their computer by displaying false “infection” messages and offering a fix in exchange for […]

1 2 3 22