How to hide/secure files on your Mac: An easy approach to protecting your data by securing, hiding, and encrypting selected files and folders in Mac OS X.
How to hide/secure files on your Mac: An easy approach to protecting your data by securing, hiding, and encrypting selected files and folders in Mac OS X.
In a perfect… http://markandersononline.com/blog/how-securely-hide-and-encrypt-files-mac-os-x/
The incognito or private mode in your web browser can offer you some additional privacy but not as much as you may think, and you still need to be careful.
The incognito or private mode in your web browser can offer you some additional privacy but not as much as you may think, and you still need to be careful.
When you… http://markandersononline.com/blog/what-does-incognitoprivate-mode-really-mean/
Understanding the concept of multi-factor authentication really isn't that hard, but it is an important step towards better digital security.
Understanding the concept of multi-factor authentication really isn't that hard, but it is an important step towards better digital security.
For this discussion… http://markandersononline.com/blog/what-multi-factor-authentication/
Anybody who resents the high prices hotels charge for wifi might roll their eyes at the 'explanation' from Marriot but they were protecting their guests. The real question is at what cost?
Anybody who resents the high prices hotels charge for wifi might roll their eyes at the 'explanation' from Marriot but they were protecting their guests. The real question is at… http://markandersononline.com/blog/marriot-wifi-jamming-not-quite-bad-it-sounds/
Believing that rampant internet piracy cost as much as $250 million in box office revenue producer Avi Lerner is going after those that downloaded The Expendables 3 illegally.
Believing that rampant internet piracy cost as much as $250 million in box office revenue producer Avi Lerner is going after individuals that downloaded The Expendables 3.
… http://markandersononline.com/blog/downloading-free-movies-getting-very-expensive/
We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.
We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.… http://markandersononline.com/blog/digital-security-password-strategy/
We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical failure or is infected by viruses or malware.
We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical… http://markandersononline.com/blog/digital-security-backup-recovery/
Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.
Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.
As a parent… http://markandersononline.com/blog/digital-security-web-content-filtering/
The recent celebrity phone hacking scandal is a reminder that digital security is a vital component of our increasingly digital lives.
Download Digital Security Excerpt From SAF Annual Convention 2014
The recent celebrity phone hacking scandal is a reminder that digital security is a vital component of our… http://markandersononline.com/blog/good-time-think-about-digital-security/
Employees will expect to use personal electronic devices in the workplace and employers need to be prepared with a BYOD (bring your own device) policy.
Employees will expect to use personal electronic devices in the workplace and employers need to be prepared with a BYOD (bring your own device) policy.
At the 2014 SAF… http://markandersononline.com/blog/protecting-your-business-byod-policy/