Category List


Tag List


Tag Cloud



Archive

Blog Search

Digital Security: Password Strategy

We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.
  We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.… http://markandersononline.com/blog/digital-security-password-strategy/

Digital Security: Backup & Recovery

We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical failure or is infected by viruses or malware.
  We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical… http://markandersononline.com/blog/digital-security-backup-recovery/

Digital Security: Web Content Filtering

Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.
  Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.   As a parent… http://markandersononline.com/blog/digital-security-web-content-filtering/

Digital Security: Find & Recover a Lost or Stolen Device

Most of us rely on mobile devices but they – and the data they contain – are easily lost or stolen.
  Most of us rely on mobile devices but they – and the data they contain – are easily lost or stolen. The solution? Recovery software that lets you lock/erase/find/recover… http://markandersononline.com/blog/digital-security-find-recover-lost-or-stolen-device/

Digital Security: Connecting Securely From Public WiFi

Accessing important information from public WiFi (the kind seen in coffee shops, airports, even in this hotel) is almost essential but potentially very dangerous.
  Accessing important information from public WiFi (the kind seen in coffee shops, airports, hotel lobbies) is almost essential but potentially very dangerous.   The… http://markandersononline.com/blog/digital-security-connecting-securely-public-wifi/