Topics
Content Types
About 8 results
-
Secure your code: iOS is rich target for spying software
The popularity of Apple devices makes them a prime target for spying programs, malware, and simple thievery.
-
Microsoft Office coming to an Apple device near you (soon)
Reports indicate that Microsoft will make an Office iOS app available in 2013.
-
Google tackles password weaknesses with two-step sign-on
Google addresses questions about the security of its cloud-based products in announcing a new two-step log-in process that aims to strengthen the password security model by adding ...
-
Getting ready for Microsoft Exchange 2010: Cover all the bases
Get ready for the upgrade to Exchange 2010 with tips from TechRepublic and a live discussion where you can pose your own questions to Dell's Microsoft MVP Chris Scharff.
-
Beware of slack data retention policies and procedures
Neglecting data retention policies can lead to embarrassing gaffes if not actual criminal proceedings. Just ask the Boston mayor's office about the costs of allowing improper delet...
-
Teach your users how to create strong passwords with our tutorial
Protecting your organization's important data starts with password security best practices. Use our Microsoft PowerPoint presentation to teach your users how to create strong passw...
-
Designing and delivering a great support experience
Register to participate in a live BNET Webcast on March 31, discussing how to design and build a customer support experience that increases loyalty and profitablility.
-
CNN Top 10 e-mail leading users to malware
Attention news junkies: The Belgian MX virus and spam blog is reporting that today's CNN Top 10 e-mail links are sending unwitting users to sites hosting malware.