![flames](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195041/flames-400x200.jpg)
12 tips for implementing secure business practices
Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105558/facebook-400x200.jpg)
Six tips for practicing safe social media
With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114011/businessman-400x200.jpg)
Why don’t all businesses have a good continuity strategy?
It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the …
![Boxcryptor](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110602/boxcryptor-400x200.jpg)
Review: Boxcryptor
Storing your data in the cloud comes with both positive and negative aspects. Boxcryptor is a solution that helps with this by encrypting your data on your device before it …
![iStorage datAshur Pro](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110943/istorage-datashur-pro-400x200.jpg)
Review: iStorage datAshur Pro
Whenever I travel, I take data I might need with me on a secure USB flash drive. Ages ago, I would encrypt these files with GPG and move them to a generic USB drive. After …
![hard drive](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112219/harddrive-400x200.jpg)
Mobile workforce exposes businesses to security vulnerabilities
U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194736/hp-400x200.jpg)
Critical flaws in HP Data Protector open servers to remote attacks
Hewlett Packard has released critical security updates for its HP Data Protector software, which fix vulnerabilities that could allow remote code execution or unauthorized …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Lack of backup tech hinders next-generation database adoption
While there is immediate and increasing interest in evolving infrastructure to support distributed, scale-out databases and cloud databases, a lack of robust backup and …
![Seagate SSD](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113654/seagate-ssd-400x200.png)
New Seagate 10GB/s SSD drive ideal for hyperscale data centers
Seagate unveiled a production-ready unit of the fastest single SSD demonstrated to date, with throughput performance of 10 GB/s. The unit, which is expected to be released …
![BorgBackup](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113732/borgbackup-400x200.png)
BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …
![Samsung Portable SSD T3](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195409/PortableSSD_T3_Main-400x200.jpg)
Samsung Portable SSD T3 offers increased data security and portability
Samsung announced the Samsung Portable SSD T3, a palm-sized, external SSD that offers multi-terabyte storage capacity. Designed specifically for today’s mobile lifestyle, the …
New flash storage architecture capable of 1TB/s
Seagate and Newisys announced that 21 Newisys NSS-2601 with dual NSS-HWxEA Storage Server Modules deployed with Seagate’s SAS 1200.2 SSD drives can be combined in a single 42U …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD