The Energy, Growth and Pollution network was established in 2003 to link together historians working on the history of energy use and its consequences for the economy and...
Small Business Network Security 101Last Updated on 2011-05-11 13:12:52Today more than ever, good network security is vital to businesses of all sizes. Cybercriminals, equipped with sophisticated software that automates the task of seeking out vulnerabilities, aren't focusing on large enterprises alone; any easy target will do. Fortunately, however, good security isn't as expensive or as complicated to implement as it used to be.
Brad Templeton - The Future of Computer Security Last Updated on 2011-05-11 06:34:05Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture is from Singularity University's Graduate Summer Program 2009. www.singularityu.org More »
Adding Security to your Windows MachineLast Updated on 2011-05-11 05:59:30Computer security is important, but a lot of people will have to pay a price that is too high if they fail to protect their systems and identity from hackers. Here are few steps to keep your computer system secure and to find an antivirus program that will not break the bank.
Do not download anything from random websites
Downloading smiley’s from pop ups, free music from some unpopular website, software from a random source or opening a link attached with spam emails that say you have just won a lottery can cause you more harm than just virus attack. Your accounts can be hacked and identity and credit card info can be stolen. BE CAREFUL and download reputable anti-malware program from a source you trust.
Use antivirus protection
Antivirus software is your system’s best line of defense against any obtrusive file or program that may comprise of malware, spyware or any malicious... More »
May 02 Ohio City’s Hard Drive Disposal Could Pose Risk of Data Theft Last Updated on 2011-05-11 05:52:20Columbus, Ohio may be placing a lot of sensitive data in danger of theft when it retires old computers according to one security expert. Columbus’ Department of Technology receives guarantees from its computer disposal vendor that all of the hard drives and other parts that may contain sensitive data have been destroyed. However, city technicians have not kept any record of exactly what they have taken out of service and sent for destruction.
“This makes it difficult to ensure that all of the retired computers have been disposed of properly,” according to Gene Spafford, a professor from Purdue University who is also executive director of the school’s Center for Education and Research in Information Assurance and Security. “If they don’t have positive tracking between tracking what’s in the system and tracking what’s being disposed of with one-to-one matches of serial... More »
Change in Default Mobile Security Stance and Mobile Device Acceptable Use Policy Last Updated on 2011-05-11 05:46:50
Following recent notification from one of the servers we manage that an attempt was made by a rogue mobile device to connect to it we have changed the default security stance of all Exchange and Small Business Servers when it comes to Mobile devices.
By a mobile device I mean a mail enabled mobile phone or an iPad or similar slate device. Heretofore, the default security stance was to allow these devices to connect and then attempt to authenticate. However, given that mobile device connections are now becoming a favorite target we have decided to modify the default security stance of these servers and disable all mobile device connections for all users that are not specifically authorized by you to make such a connection. This will reduce the risk footprint considerably for all servers.
We have completed this work and will be sending you a list of mobile devices that have made... More »
Drag and drop the content to change the order of featured content. The top nine will be displayed.