• Blog
  • Forums
  • Home
  • Links
  • Privacy Policy
  • Security Beacon Store
  • Security Check List
  • Terms of Use
  • Security Beacon

    Security Beacon

--

  • February 18, 2019
  • Login
  • Become a member
  • Home
  • Blog
  • Security Check List
  • Store
  • Home
  • Blog
  • Security Check List
  • Store

Best Practices

Best Practices
  • Home
  • Best Practices
  • David H. Petraeus
    Best Practices,  E-mail
    0 1374 0

    Affairs and Email: Lessons Learned From Top Spook

    Whether you use email for business affairs or illicit affairs, there are many lesson to learn from David Petraeus and his paramour. If you have been hunting terrorists for a while and are the chief spook at the CIA, you should know how to keep...

    By Secure Life
    November 13, 2012
  • Backup,  Best Practices
    0 662 1

    Best Practice for Drive Images – Updated

    Yesterday, one of my clients asked me why they need to have more than one image of the hard drive on their server. It seemed obvious to me, but it clearly wasn’t obvious to them, so I thought it might be a good idea to...

    By JR
    September 15, 2012
  • Backup,  Best Practices
    0 1141 0

    Redundancy! It’s Good for Your Business!

    Preface Ironic as it may sound, I was writing this post yesterday when access to our WordPress site was terminated by the Anonymous attack on GoDaddy.com. At first I thought I screwed something up but after a few minutes I convinced myself that it wasn’t...

    By JR
    September 11, 2012
  • Bring Your Own Device
    3G / 4G networking,  Android
    0 1600 0

    BYOD (Bring Your Own Device) = BAD IDEA!

    Introduction BYOD (Bring Your Own Device) is a new trend (maybe the norm in some places by now?) where employees bring their personal computers, phones, USB flash drives, etc. to work and use them for work as well as personal needs. Companies are apparently encouraging...

    By JR
    May 18, 2012
  • 3G / 4G networking,  Best Practices
    0 1239 2

    Top Security Rules for your mobile phone! Updated!

    Rule #1 - JUST PUT THE DAMN PHONE DOWN AND DRIVE!

    By JR
    March 15, 2012
  • Best Practices,  Uncategorized
    0 1470 0

    FCC Launches Cyber Planner Website

    The FCC cyber planner site provides an excellent starting point for small businesses and home users interested in improving their security.

    By JR
    December 16, 2011
  • Best Practices,  Passwords
    0 1384 0

    The proper way to let a guest use your computer

    Some suggestions to keep you safe when you need to let a guest use your computer.

    By JR
    September 9, 2011
  • Best Practices,  WiFi / Wireless networking
    0 1180 1

    Using Open Wireless Connections

    For most people with a smartphone, laptop and a car or bike open wifi networks are a part of life, right?  You head to Starbucks, Panera Bread or some other locale and they have a sign that says “Free WIFI”. So most of us just...

    By hakan wall
    August 24, 2011
More

Making the Internet Secure


Follow Us

Recent Posts

  • maxresdefault-2-260x188.jpg
    Security Alert! The TrueCrypt Debacle
    JR
    May 30, 2014
  • truecrypt-microsoft-massoneria-260x188.jpg
    Security Alert! Truecrypt Site Changes – Updated!
    JR
    May 28, 2014
  • ubuntu-1479771_1280-260x188.jpg
    Experiences with Xubuntu 14.04 – Updated
    JR
    May 26, 2014

Live from Twitter

Back to top

Copyright © 2015 XplodedThemes