Go Premium for a chance to win a PS4. Enter to Win

x

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

[Webinar] Cloud Killed the Firewall
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk the cloud can bring to company infrastructure. The more cloud applications we add, the greater the number of vulnerable entrypoints. Most basic firewalls can't keep up.

In this webinar, Skyport Systems explains how legacy DMZ architectures cannot accommodate this highly agile, cloud-connected enterprise, and how companies can create new security policies to adapt to this shift. View the video to learn how to make your enterprise "cloud ready."
0
Vote for the Most Valuable Expert
LVL 7
Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

How to create signatures in the free Adobe Acrobat Reader DC software
In a question here at Experts Exchange, a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat product). The member requested step-by-step instructions. This 5-minute Experts Exchange video Micro Tutorial provides detailed steps showing how to do it.

1. Open the PDF file and view the Tools


Open the PDF file with Adobe Acrobat Reader DC.

Click either:

the View>Tools>Fill & Sign>Open menu

or:

the sideways triangle on the right side to open the Tools panel.

Step1

2. Run the Fill & Sign tool


If you used the first method in Step 1, the Fill & Sign tool will be open.

If you used the second method in Step 1, click the Fill & Sign tool in the Tools panel to open it.

Either way, you'll have this:

Step2

3. Click the sign tool, which is the pen tip


Click the tip of the pen, which brings up the Add Signature and Add Initials choices.

Click Add Signature.

Step3

4. Select Type or Draw or Image


Click the Type or Draw or Image icon (default is Type).

Enter your signature, depending on the choice you made above.

Step4

5. Place your signature


Position the mouse on the page and left-click to place the signature.

Use the sizing handle in the lower right corner, if desired, to size the signature.

Step5

6. To edit/change signature, delete it and create new one


There is no way to edit/change the signature, so delete it and create a new one, if needed.

Click the minus sign to delete it, then start over at Step 3.

Step6

7. Save the file with the signature


After placing the signature, do a File>Save or Save As to save the file with your signature.

Sterp7
That's it! If you find this video to be helpful, please click the thumbs-up
2
[Webinar] How to Protect Against Ransomware
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.

Watch this webinar to learn:
  • What is ransomware and why does it hurt?
  • How to prevent ransomware
  • How to create and implement a recovery plan

With a proper disaster recovery plan in place, you don’t have to fear the worst, should your company become a target of ransomware.
1
[Webinar] Multi-Vector Protection from Cyber attacks
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data.

But that feeling is fleeting. Attacks these days can happen in many ways and from angles we never saw coming. That’s why companies like Webroot, who focus on security solutions, want to inform those of us in the IT security industry on best ways to protect ourselves from multi-vector attacks, not single endpoint protection.

Watch Webroot’s discussion of the complexities of modern-day cyber threats and how we can properly practice multi-vector protection for maximum security.
3
[Webinar] How Hackers Steal Your Credentials and Why Active Directory Must be Secure to Stop Them
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can result in an oversight, leaving weak spots in our system exposed to the outside world. The most often overlooked weak spot? Credentials.

In this webinar, we're shown how to step out of our existing roles and mindsets and step into those of a hacker looking for AD credentials. You'll see where credentials are stored and how improper monitoring can weaken security and make it easier for hackers to gain access to your database.

View the webinar to learn how to mitigate credential issues and vulnerabilities by locking down admin credentials for good.
0
How to password-protect a PDF with free software
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This video explains how to do it with excellent, free software called PDF-XChange Editor from Tracker Software Products.

1. Download PDF-XChange Editor


Visit the PDF-XChange Editor section of the Tracker Software Products website:

http://www.tracker-software.com/product/pdf-xchange-editor

Click the white-on-green Download button for either product. It doesn't matter if you download PDF-XChange Editor or PDF-XChange Editor Plus, since you'll be selecting the Free Version when you install.

Step1

2. Run downloaded installer


Run the downloaded installer and select Free Version (unless, of course, you want more features and decide to purchase the Pro or Plus Version).

Step2

3. Open a non-secured PDF file in PDF-XChange Editor


Run PDF-XChange Editor and open a PDF file that does not currently have password protection on it.

Step3

4. Open Security section of Document Properties


Click File menu.

Click Document Properties.

Click Security category.

Step4

5. Open Password Security Settings dialog


Click Security Method drop-down.

Click Password Security.

Step5

6. Fill in Password Security Settings dialog


In Options section, select Compatibility from the drop-down and what you want encrypted via the radio buttons.

In Document Passwords section, enter password to open PDF and password to change permission settings.

In Permissions section, set Printing Allowed and Changing Allowed choices via the drop-downs; enable/disable content copying and
2
 
LVL 4

Expert Comment

by:Stephen Kairys
OK, maybe there's a bug in the software. After I click YES to confirm, the program, on its own, reprompts for the password.
password problem
Thanks,.
0
 
LVL 56

Author Comment

by:Joe Winograd, EE MVE 2015&2016
Ah, now I see! Here's what's happening. There are two types of passwords for PDFs — Owner Password and User Password. The User Password is what's needed to open the file. The Owner Password is what's needed to set permissions/restrictions (and it may also be used to open the file). Your PDF file has an Owner Password on it — do you know what it is? If you open the file with the User Password, you will get the prompt that you posted for the Owner Password when trying to change security (or when changing any permissions/restrictions). If you open the file with the Owner Password, you will not get a prompt for the Owner Password when trying to change security (or when changing any permissions/restrictions). Note that you have a choice when opening the file of entering either the User Password or the Owner Password:

enter user or owner password
Regards, Joe
0
Phishing Awareness Training
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers.

According to a report by Verizon, only 3% of targeted users report malicious emails to management. With companies facing potentially billions in losses from a phishing attack, it is imperative to implement a phishing awareness programs to properly train users.

Understanding that the best way to teach phishing aversion is to inform the user as soon as they clicked on a phishing link, we have devolved an immersive user awareness training program.

Our user phishing awareness training is easy to deploy and even easier to see results from. We offer a comprehensive package that includes top-of-the-line support and detailed reports outlining your company’s phishing susceptibility rate.
1
Secure Portal Encryption
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient has done so, they can then access the encrypted email.
0
PDF Encrypted Email
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundry Secure Encryption Gateway and then sent on to the sender. The generated password can be delivered to the recipient by whatever method the sender prefers, it could be via SMS, WhatsApp or Facebook Messenger. Anyone with a basic PDF viewer on their device can access the PDF encrypted file.
0
Full Stack Email Security
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email
Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat Intelligence to email traffic for early threat detection.
2
How to Send a Secure Fax
Sending a Secure fax is easy with eFax Corporate. First, just open a new email message.
In the To field, type your recipient's fax number @efaxsend.com.
You can even send a secure international fax — just include the country code before the area code in your address.
Now just attach the files you want to fax, enter a title in the email's subject line, and type a message in the body.
eFax Corporate converts this to your fax cover page.
When you're ready, just click your email's Send button to send your secure fax.
That's it! Your recipient will receive your document as they would any standard fax.
0

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.