Articles in this category
Latest Articles
-
by RascallyRobbo - 2007-05-01
But even if you have had your employees screened prior to them joining your work force you should still remain vigilant. Research has shown that certain behaviour patterns can indicate that an employe...
-
by Andy Lawson - 2007-05-01
What Does This Act Mean for Californians?With the increasing incidence of identity theft, the state of California has passed a law that essentially protects personal information of its citizens. The C...
-
by Dan Riffle - 2007-04-30
One of the main parts of an effective identity theft protection system is to simply be aware of what information you are giving out and to whom you are giving it. This may seem obvious, but today's te...
-
by David Faulkner - 2007-04-30
A number of companies are coming out with identity theft insurance programs but there is still a debate as to whether identity theft insurance is actually required. In this article we will look at a n...
-
by Mandy Fain - 2007-04-26
Holidays are a dangerous time in terms of identity theft - whether because of people using their credit cards more often, or because they are less careful during these times. It is therefore important...
-
by Warren Franklin - 2007-04-23
Low Risk - High Return - Work Your Own HoursThe Ultimate Get Rich Quick SchemeWow! Can you imagine a help wanted ad like that in your local newspaper or pay-per-click ad in your favorite search engine...
-
by Sam Miller - 2007-04-17
Identity theft can happen to anyone at anytime. Usually this happens when someone steels personal identification from you such as a Social Security number, a credit car number, or a bank account numbe...
-
by Sam Miller - 2007-04-17
The idea behind clearing your browser's cache is simple, cache equates to space and every computer needs as much space as physically possible in order to operate at its optimum performance. Speed is t...
-
by BitDefender Review - 2007-04-16
I wanted to post this BitDefender review after I had a chance to check out this popular Internet security product. Hopefully, after reading this review of BitDefender you'll know whether or not it's t...
-
by ZoneAlarm Review - 2007-04-16
I wanted to post my ZoneAlarm review after having an opportunity to check this program out. Hopefully, after reading this short review of what ZoneAlarm has to offer, you'll have a good idea whether o...
-
by Sam Miller - 2007-04-16
Web cookies are text files that are sent by your server to a web page and then sent back each time you visit that particular site. The term came from a well known idea in Unix computing called the "Ma...
-
by Mandy Fain - 2007-04-12
What exactly is credit card identity theft, how is it used and how can you prevent it? In this article we will look at ten facts you need to know about credit card identity theft in order to better pr...
-
by Stephen Thomson - 2007-03-30
If you connect an unprotected computer or computer without any security software to the internet, cyber criminals, hackers or identity thieves can attack your computer within seconds. So, to avoid suc...
-
by Stacey Moore - 2007-03-30
If you want your small business to move forward, it pays to back up. That's the advice from IT experts, who say that backing up data is critical to protecting a business. Data loss can cause companies...
-
by Shari Hearn - 2007-03-30
Is online banking safe?To those who fear being ripped off by cyber-thieves, the answer is a resounding "no." There are criminals lurking online just waiting for an opportunity to steal your banking in...
-
by Mary Markell - 2007-03-30
Temporary Internet Files are files like images, videos, websites, text, cookies etc. and they are stored in your hard drive on the backscene. Their purpose is to speed up surfing. When you visit a pag...
-
by Karl Smith - 2007-03-26
These are some of the most dangerous things you can do online. They are the most common methods people use to place themselves in danger on the Internet.Download attachements which are included in ema...
-
by Deepak Khanna - 2007-01-25
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transactions on the Internet. While doing many of these transactions, we tend to pass on very sensitive info...
-
by InfoSecurityLab - 2007-01-23
The U.S. Government's National Information Assurance Glossary defines Information Security as: Protection of information systems against unauthorized access to or modification of information, whether ...
-
by InfoSecurityLab - 2007-01-23
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithms, which provide systems safety, for example data encryption and hashing. Information security aware...