Heard about BYOD to Work?

Is your staff bringing their own devices and gadgets to the workplace? There are pros and cons that you need to know before you decide to adopt this practice for your business.

You may have noticed more and more of your employees or colleagues bringing their own computing devices to work—be it their mobile phone, tablet, or laptop.

Boost Productivity With these 4 Free Tools

Did you know that there are many free tools available on the web that can increase your productivity? Especially beneficial to small companies who can always use the savings, these free applications and software, if used correctly, can both increase productivity and help maximize the resources they have at hand.

Hard Drive Prices Rising

While the massive flooding in Thailand ravaged hundreds of thousands worth of property and infrastructure, it also has had an adverse effect on worldwide hard drive production. Since the majority of the world’s hard drive factories are located in Thailand, hard drives will be in short supply in the coming months.

Managing In-house Social Networks

The effect of social networks on the way companies approach their business is undeniable. Some even go a step further, creating their own internal social networks to help enhance communications within their own organizations. However, for it to function best, the proper policies that govern its use should be developed.

The 25 Worst Passwords, Ever

Passwords are an integral part of securing both IT systems and online accounts. In order to keep your system and information safe, it is important to take the time to create strong passwords that hackers and online thieves won’t easily figure out.

If you think using ‘password’ as your password is no big deal, then it’s time to rethink.

Trend Micro Helps Bust 4 Million Bots

A massive network of bots – an estimated at least four million of them – was taken down in a raid recently. Completed with the cooperation of the United States Federal Bureau of Investigation (FBI), authorities in Estonia, as well as security firm Trend Micro, this bust is the biggest cybercriminal arrest in history.

Balancing Freedom and Security

Security experts are predicting a rise in the use of personal gadgets to access company data – which means that you will have less control over what kind of data goes in and out of your IT system. The best way to rectify this is by having a concrete and comprehensive IT policy that secures your data – without compromising the freedom of your employees to use their mobile devices.

Security: For Businesses Big AND Small

A survey by StaySafeOnline.org shows some disturbing results – that a large number of small business, while largely dependent on their computer systems, do not see themselves as threatened by hackers and online thieves. This results in a significant percentage of them having poor or mediocre security.

Beware of Facebook Scams

As the worldwide use of Facebook continues to grow, more and more scams are appearing on the popular social networking website. Using promos, “interesting” links and all other sorts of strategies to trap you, a grain of salt is always needed when dealing with things outside of what Facebook offers.

Android malware explodes, jumps five-fold since July

Source: Computerworld
By Gregg Keizer
'Exponential growth' driven by Google's policy of not vetting apps, veteran hackers moving to Android
Computerworld - Malware targeting Google's Android mobile operating system exploded in the last several months, its volume quintupling since July, Juniper Networks said today.