What should you be looking for in a cloud-based recovery solution? Do you store everything up in those clouds? Read this free white paper: Best Practices for Cloud-Based Recovery
How has computer disaster recovery evolved over the years? Do you have a recovery plan in place? Read this free infographic: Evolution of IT Disaster Recovery
Are you using layered security for your computer? If not, why not? It’s definitely the best way to stay safe. Read this free report: Layered Security: Why It Works
Are you an IT manager? What does your disaster recovery plan look like — and will it really work? If you’re just a home user, do you even have a DR plan? You should. Read this free guide: 10 Things Your Team is Afraid to Tell You About Your DR Plan
Are you an IT pro in charge of the BlackBerry devices that your company uses? How do you manage security? Here’s a free guide you might want to check out: Protection for Every Enterprise: How BlackBerry Security Works
How much do you know about subnetting? It may not be your most favorite task, but every IT person needs to understand this concept. Read the free Quick and Dirty Subnetting guide!
Have you thought about a career in cybersecurity? Read the free white paper: Planning a Career Path in Cybersecurity
When was the last time you used FTP? If you transfer files with any frequency, then this free guide might be worth a peek. Read: Practical Guide to Secure File Transfers
Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.
This is a sponsored post written by me on behalf of Vipre for SocialSpark. All opinions are 100% mine. Today I’m announcing the second winner of my giveaway for a one-year license to the 2013 edition of VIPRE Internet Security. I already gave away a license to a lucky LockerGnome reader who had commented to […]
This is a sponsored post written by me on behalf of Vipre for SocialSpark. All opinions are 100% mine. Last week I installed a better Internet security application than I’d been using on my Windows test system. As I described at the time, VIPRE Internet Security 2013′s installation process was clear and simple, and my […]
Add to iTunes | Add to YouTube | Add to Google | RSS Feed Is location-based social media an incredibly innovative technology that will garner relationships and bring them to the real world, or a creepy way to help evildoers find out where you are, or where you aren’t? One thing is for sure, this […]
Apple was silent for far too long on the matter of the Mac Defender Malware, a Rogue anti-virus application like those seen on Windows machines for the past few years. This type of malware tricks users into thinking they are protecting their computer by displaying false “infection” messages and offering a fix in exchange for […]
Newsflash: your Apple machine actually can become infected. Wait, what? You didn’t already know that? Seriously? I’ve been telling you for years that it’s possible. Other writers have attempted to educate you. Your Mac is not a steel wall against malware, people. It’s always been possible for an Apple computer to be infested with some […]
Let me guess: you happen to think you’re pretty secure when you are online. After all, you use secure passwords! You didn’t subscribe to the Playstation Network. You are pretty smug, aren’t you? I have some news for you, though: even geeks and smart people can have their information stolen, and it’s easier than you […]