Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

[Webinar] Multi-Vector Protection from Cyber attacks
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data.

But that feeling is fleeting. Attacks these days can happen in many ways and from angles we never saw coming. That’s why companies like Webroot, who focus on security solutions, want to inform those of us in the IT security industry on best ways to protect ourselves from multi-vector attacks, not single endpoint protection.

Watch Webroot’s discussion of the complexities of modern-day cyber threats and how we can properly practice multi-vector protection for maximum security.
3
Protect Your Retail Business and Reputation
Protect Your Retail Business and Reputation

Wi-Fi access doesn't just impact your business & customer experience, it can also affect your security.  Join us for an informative webinar to learn more about the top threats and trends impacting retail today, and the key solutions to protecting retail networks and reputations.

[Webinar] How Hackers Steal Your Credentials and Why Active Directory Must be Secure to Stop Them
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can result in an oversight, leaving weak spots in our system exposed to the outside world. The most often overlooked weak spot? Credentials.

In this webinar, we're shown how to step out of our existing roles and mindsets and step into those of a hacker looking for AD credentials. You'll see where credentials are stored and how improper monitoring can weaken security and make it easier for hackers to gain access to your database.

View the webinar to learn how to mitigate credential issues and vulnerabilities by locking down admin credentials for good.
0
How to password-protect a PDF with free software
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This video explains how to do it with excellent, free software called PDF-XChange Editor from Tracker Software Products.

1. Download PDF-XChange Editor


Visit the PDF-XChange Editor section of the Tracker Software Products website:

http://www.tracker-software.com/product/pdf-xchange-editor

Click the white-on-green Download button for either product. It doesn't matter if you download PDF-XChange Editor or PDF-XChange Editor Plus, since you'll be selecting the Free Version when you install.

Step1

2. Run downloaded installer


Run the downloaded installer and select Free Version (unless, of course, you want more features and decide to purchase the Pro or Plus Version).

Step2

3. Open a non-secured PDF file in PDF-XChange Editor


Run PDF-XChange Editor and open a PDF file that does not currently have password protection on it.

Step3

4. Open Security section of Document Properties


Click File menu.

Click Document Properties.

Click Security category.

Step4

5. Open Password Security Settings dialog


Click Security Method drop-down.

Click Password Security.

Step5

6. Fill in Password Security Settings dialog


In Options section, select Compatibility from the drop-down and what you want encrypted via the radio buttons.

In Document Passwords section, enter password to open PDF and password to change permission settings.

In Permissions section, set Printing Allowed and Changing Allowed choices via the drop-downs; enable/disable content copying and
2
Phishing Awareness Training
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers.

According to a report by Verizon, only 3% of targeted users report malicious emails to management. With companies facing potentially billions in losses from a phishing attack, it is imperative to implement a phishing awareness programs to properly train users.

Understanding that the best way to teach phishing aversion is to inform the user as soon as they clicked on a phishing link, we have devolved an immersive user awareness training program.

Our user phishing awareness training is easy to deploy and even easier to see results from. We offer a comprehensive package that includes top-of-the-line support and detailed reports outlining your company’s phishing susceptibility rate.
1
Secure Portal Encryption
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient has done so, they can then access the encrypted email.
0
PDF Encrypted Email
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundry Secure Encryption Gateway and then sent on to the sender. The generated password can be delivered to the recipient by whatever method the sender prefers, it could be via SMS, WhatsApp or Facebook Messenger. Anyone with a basic PDF viewer on their device can access the PDF encrypted file.
0
Full Stack Email Security
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email
Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat Intelligence to email traffic for early threat detection.
2
How to Send a Secure Fax
Sending a Secure fax is easy with eFax Corporate. First, just open a new email message.
In the To field, type your recipient's fax number @efaxsend.com.
You can even send a secure international fax — just include the country code before the area code in your address.
Now just attach the files you want to fax, enter a title in the email's subject line, and type a message in the body.
eFax Corporate converts this to your fax cover page.
When you're ready, just click your email's Send button to send your secure fax.
That's it! Your recipient will receive your document as they would any standard fax.
0

Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.