BYOD Rules, Network Security & Your Business

BYOD Rules, Network Security & Your Business

The integration of sophisticated interfaces in modern devices has made it difficult to draw a line between personal and business usage. Nearly a decade back, it was fairly easy to differentiate between data/software/applications targeted or being used at an enterprise level and those at a personal scale.

The data that is being circulated around can be classified as business and non-business. Each has its own specific attributes with respect to sharing and security management. For instance, under no circumstance would you want enterprise data (account information, client detail, etc.) to be circulated freely.

Read more

CryptoLocker – Holding Your Computer for Ransom

CyptoLocker - Holding Your Computer for Ransom

In September 2013 a new type of malware was discovered to be making the rounds in computers running Microsoft Windows. This new malware is not really a virus because it typically requires a user to open an infected e-mail. What makes this malware particularly dangerous is what it does once it infects your computer – it holds your files for ransom.

How to Backup Your Files for Years to Come

How to Backup Your Files for Years to Come

It is amazing how fast life can go by sometimes. I was recently looking at some of my digital photos and realized that I have over 28,000 digital photos saved since 2002. That was the year I bought my first digital camera. Back then I didn’t realize how many I would actually accumulate, but after starting a family since that time, the number of photos has grown exponentially.

Photos aren’t something that I can recreate, which means that if I lose one, it is lost forever. If you are like me and have kids, losing photos is probably something you hope will never happen – because you can’t retake the picture. As I was going through my photos I am always glad that I have a good backup process in place that allows me to enjoy the same photos 11 years after they were taken. Having a backup process is the reason that I know I can view these photos 11 years into the future and beyond.

Read more

How to Secure the Linksys EA4500 Wireless Router

How to Secure the Linksys EA4500 Wireless Router

Wireless routers, by default, are unsecured when you connect a router for the first time. This is important to know as you will need to take the necessary steps to secure any wireless router that you have just purchased. With regards to Linksys routers, the steps to secure the router are very similar, so if you have trouble finding proper steps to secure your Linksys router, you can usually follow steps for another Linksys router.

The Top 3 Most Dangerous Computer Viruses

The Top 3 Most Dangerous Computer Viruses

Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all).

Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem.

Since then, viruses were developed with different purposes. These days when you talk about a computer virus, you think about malicious programs with evil intentions.

For good reasons, too.

Do you know how much destruction computer viruses are causing every year?

Billions.

Yes, that’s in dollars. Millions of computers get infected every year, and billions of dollars are lost.

Read more

How to Simplify Your Backup Process

How to Simplify Your Backup Process

If you used computers for any length of time, chances are that you have experienced a computer crash. If you were lucky, you were only faced with the hassle of attempting to get your computer up and running. However, in far too many cases, computer crashes result in partial or total data loss.

Backing up your essential files and programs has always been wise, but in past decades the process was cumbersome, slow and expensive. These days, there is little excuse not to back up your computer files. In many cases the backup process runs in the background, allowing you to continue to use your computer while protecting your data against loss. Depending on your needs and your budget, you also have several data backup options.

Read more

DDoS Attack Metrics for 2013 [Infographic]

DDoS Attack Metrics for 2013

Getting yourself informed on DDoS attack trends from quarter to quarter through the year is a vital part in understanding and preventing these attacks on your data and security. Only through obtaining accurate facts and figures will you able to get yourself properly learned and well-prepared in the event you need protection. Take a look at this infographic to get a clear and coherent review, through stats and figures, of DDoS attacks from the first quarter of 2013, compared to the second quarter.

In merely a single quarter, DDoS attacks have grown not only in size, but power and duration as well. This infographic will give a break down on the comparison of total DDoS attacks, DDoS attack modes, and average duration, bandwidth, and packets-per-second. From the first quarter to the second, the percentage of total DDoS attacks has went up a full 20 percent, while average duration has increased 10 percent. Get detailed info on all aspects of DDoS attacks from the first to second quarter, through this infographic.

Read more