Chad Perrin

Displaying 1-9 of 9 results

  • Downloads // Apr 2011

    10 things you should do to securely dispose of computers

    The need for good security practices doesn't go away just because a system has outlived its usefulness. These tips will help ensure that decommissioned equipment doesn't pose a threat.This download is also available as an entry in our 10 Things blog.

    Provided By Chad Perrin

  • Downloads // Apr 2010

    10 security books you might want on your reading list

    An ever-evolving list of books 'to be read' is a constant temptation. Chad Perrin hopes his security book wish list will tempt you, too.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // May 2009

    10+ reasons why people write viruses

    Why do people write viruses and other mobile malicious code? The answer isn't as simple as it used to be. Here are some possible motives suggested by security expert Chad Perrin and several TechRepublic members.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2009

    10 tips for secure computer disposal

    If you're in charge of IT resources at an organization with more than a handful of users, you might need this advice for secure equipment disposal.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Mar 2009

    10 ways to protect yourself when you leave a job

    Employers aren't the only ones who have to look after security when an employee leaves. If that departing employee is you, make sure you pay attention to threats to your personal privacy and security.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Feb 2009

    10 ways to protect your company from employee transition risks

    Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Dec 2008

    10 essential e-mail security measures

    E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. These best practices will help you avoid any mistakes. This download is also available...

    Provided By Chad Perrin

  • Downloads // Aug 2008

    10 common security mistakes that should never be made

    There's no shortage of difficult security challenges -- so why take chances and overlook the easy stuff? Chad Perrin describes some of the worst (and all too common) security oversights he sees on a regular basis.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Jun 2008

    10 things you should do to ensure basic Web site security

    Using a security procedures checklist is your first step toward securing a resource -- a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites...

    Provided By Chad Perrin

  • Downloads // Jun 2008

    10 things you should do to ensure basic Web site security

    Using a security procedures checklist is your first step toward securing a resource -- a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites...

    Provided By Chad Perrin

  • Downloads // Aug 2008

    10 common security mistakes that should never be made

    There's no shortage of difficult security challenges -- so why take chances and overlook the easy stuff? Chad Perrin describes some of the worst (and all too common) security oversights he sees on a regular basis.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Dec 2008

    10 essential e-mail security measures

    E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. These best practices will help you avoid any mistakes. This download is also available...

    Provided By Chad Perrin

  • Downloads // Feb 2009

    10 ways to protect your company from employee transition risks

    Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Mar 2009

    10 ways to protect yourself when you leave a job

    Employers aren't the only ones who have to look after security when an employee leaves. If that departing employee is you, make sure you pay attention to threats to your personal privacy and security.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2009

    10 tips for secure computer disposal

    If you're in charge of IT resources at an organization with more than a handful of users, you might need this advice for secure equipment disposal.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // May 2009

    10+ reasons why people write viruses

    Why do people write viruses and other mobile malicious code? The answer isn't as simple as it used to be. Here are some possible motives suggested by security expert Chad Perrin and several TechRepublic members.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2010

    10 security books you might want on your reading list

    An ever-evolving list of books 'to be read' is a constant temptation. Chad Perrin hopes his security book wish list will tempt you, too.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2011

    10 things you should do to securely dispose of computers

    The need for good security practices doesn't go away just because a system has outlived its usefulness. These tips will help ensure that decommissioned equipment doesn't pose a threat.This download is also available as an entry in our 10 Things blog.

    Provided By Chad Perrin