In a Tech Brief on education security, Lisa Myers gives lessons for IT pros. She issued the following challenge: How to lock down information while keeping it available for legitimate use and…
In this Tech Brief, Stephen Cobb outlines the layered approach to defending your systems and data. by addressing the following: information security policy, awareness and training, backups and…
This Tech Brief covers cloud computing for small business, including ESET security solutions and these cloud benefits: flexibility, accessibility and secured, safe data. ESET provides secure…
This Tech Brief covers the three keys to secure collaboration: in-depth deploy defense, two-factor authentication and encryption. ESET collaboration products include: secure authentication, DESlock+…
This Tech Brief details the five steps to greater control over mobile-device security. They are: implement encryption, two-factor authentication, mobile-security policy, interactive security training…
This Tech Brief details how small-to-medium size businesses are increasingly turning to cloud storage. The three reasons people are moving to the cloud are: simple computing, external troubleshooting…