Accidents, bad ideas, and abuse are possible in any congregation of human beings, and the workplace suffers its share.
For businesses large and small, the best tools for keeping inappropriate behavior to a minimum are company guidelines and policies — and the law of the land.
Common sense prevents us from leaving our wallets or purses out where anyone could pilfer them, yet we’re not so careful when sending sensitive information by e-mail or other digital methods.
Keeping your important personal data and documents secure when they’re on the move requires a few extra — but necessary — steps if you want to protect your finances.
It’s that tech-support nightmare. You’ve barely described your computer’s troubles when your “support” advises formatting the hard drive and reinstalling Windows.
Hold on, don’t do that! If Windows at least boots before your problems begin, I’ve got six tricks you can try before reinstalling the operating system.
Most users of Web-based e-mail services assume that as long as they’re connected to the Internet, they’ll have 24/7 access to their accounts.
But a recent Gmail failure proved otherwise. Here’s how to create backups of all your mail residing in the cloud.
Windows 7 Service Pack 1 is out. But does that mean you need to install it?
For those who just bought a brand-new PC, install it. For those who are running an existing Windows 7? You’ll need it, just not for several months.
When Windows won’t boot and you get on the phone for tech support, one of the most common solutions is to reinstall Windows.
But that should be your court of absolutely last resort. There are many less destructive and less time-consuming techniques for getting Windows up and running again.
In this time of tight budgets, paying to pay seems especially galling.
The good news is that many of us can use a free IRS service to calculate our contribution to the Feds — but you still have to do some homework.
We may know that computing is rapidly ascending into the cloud, but do we know where we’re going and what the “cloud” is, exactly?
Once a simple euphemism for the World Wide Web’s infrastructure, cloud computing is rapidly becoming a complex virtual world where we work and play.
It’s an all-too-common occurrence: As soon as Internet Explorer gets patched, another zero-day exploit is discovered.
If you’d like to give IE more protection from hackers, Microsoft has a little-known, free tool — EMET 2.0 — you should take a look at.
The security certificates provided by various companies are supposed to update automatically, but sometimes the process fails and creates a mess.
But botched updates can leave behind remnants of certificates that are a pain to remove. They also raise the question: Why do we need them?