Searched for: "microsoft office system document encryption"
- Microsoft (35)
- Security (18)
- Software (18)
- Hardware (9)
- Networking (8)
- Cloud (7)
- Collaboration (7)
- Data Centers (6)
- Mobility (6)
- Apple (4)
- Cxo (4)
- Open Source (4)
- Enterprise Software (3)
- After Hours (2)
- Printers (2)
- Project Management (2)
- Smbs (2)
- Tech & Work (2)
- Banking (1)
- Consumerization (1)
- Developer (1)
- Social Enterprise (1)
- Virtualization (1)
About 144 results for "microsoft office system document encryption"
Andy Wolber shows you how to edit Word, Excel, and PowerPoint documents stored on Google Drive from your desktop or mobile device.
Windows 10 users, learn what information is shared with Microsoft by default, and how to configure your installation.
Should you upgrade to what Microsoft has called the last version of Windows?
Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective i...
iOS, Microsoft Office 365, and Microsoft Enterprise Mobility Suite are coming together to drive the mobilization of Microsoft SharePoint.
Boole Server, an Italian ECM services provider that offers a secure sharing solution for documents, is opening offices in Boston and San Francisco in 2014. Read what it does and do...
The authors of Duplicati, an open-source file backup client, discuss the impetus for the creation of their project, keeping data secure in the cloud, and backup integrity with incr...
The end of extended support for Windows Server 2003 is just under a year away. One manager says the average migration will take 200 days, so start thinking about migrating if you h...
In an important decision, the United States Supreme Court found that law enforcement officers generally need to get a warrant before searching the mobile device of an arrestee.
Find out what the Heartbleed security threat might mean to you and your organization and how to handle it.