Archive

EXPERT ADVICE

Ten Steps to E-Mail Security

More than 10,000 students depend on Jill Cherveny-Keough for trustworthy computing systems. As director of academic computing at the New York Institute of Technology (NYIT), Cherveny-Keough must ensure that dozens of computing centers across the college's campuses run without a hitch. Fall is an esp...

INDUSTRY REPORT

Financial Institutions Unwitting Accomplices of ID Thieves

Financial services companies might be unwitting contributors to the nation's identity theft problem, according to a report from Forrester Research in Cambridge, Massachusetts. The Federal Trade Commission (FTC) estimates that identity theft costs American businesses US$50 billion to $60 billion a ye...

TECHNOLOGY SPECIAL REPORT

Battening Down the E-Mail Hatches

Viruses delivered by e-mail, phishing attacks and spam are becoming as much a part of using computers as accidents, tolls and bumper-to-bumper delays on the freeway are in commuting to work each day. Both situations cause frustration, steal productivity and cost money. Phishing scams trick e-mail re...

Elon Musk's Dec. 2 action to release The Twitter Files: Approve or Disapprove?
Loading ... Loading ...

LinuxInsider Channels