1. Industry
Send to a Friend via Email

Your suggestion is on its way!

An email with a link to:

http://bizsecurity.about.com/od/informationsecurity/

was emailed to:

Thanks for sharing About.com with others!

Information Security

Information Security addresses actions businesses can take to protect computers, documents and intellectual property. Topics covered include: internet security; email security; network security and document handling.

Geotagging
Geotagging is a powerful technology that can be used to track you if you are not careful.

How to Secure Your Twitter Account
Essential Steps for Securing Your Twitter Account

LifeLock's Very Odd Case
LifeLock quickly resolves an issue that stumped law enforcement.

Readers Share Their Experience with Anti-virus Programs
Our readers share their experience with anti-virus software

4 Things You Can Do to Secure Your Smartphone
4 steps you can take now to protect your smartphone from viruses and hackers.

An Attorney General's View of the LifeLock Lawsuit
Attorney General Ken Cuccinelli offers insight into the LifeLock Lawsuit

The LifeLock Lawsuit
A brief history of the Federal Trade Commission lawsuit against LifeLock.

The Top Free Antivirus Programs

By downloading one of these free programs on your home machine, you can take the application for a test drive before you decide to launch it as a business application.

How to Set a BlackBerry Password
How to protect your BlackBerry with a password

ATM Skimming
How to protect yourself from ATM skimming

Copier Hard Drive Security
How to secure the information on your copier hard drive

How to Secure Your Smartphone
A look at the future of smartphone security

Traveling with Laptop Security in Mind
Best practices for traveling securely with your laptop

Online Banking Security
7 Best Practices for Securing Your Online Transactions

Security Pros Share Their Trickiest Wireless Applications
Security professionals describe their best wireless security applications

A Short History of AES Encryption
A short history of the development of the AES encryption standard.

15 Ways to Provide Strong Identity Theft Protection
15 Ways to Provide Strong Identity Theft Protection

How Cybercrime Pays
Why Talented People Will Work So Hard to Infect Your Computers

Information Security
A guide to securing computer hardware and sensitive data.

AVG Business Security
A Review of AVG's Suite of Business Security Software

How to Erase a Hard Drive Completely
How to erase a hard drive so that data cannot be retrieved.

Creating Strong Passwords
A method for creating strong passwords, with tips for guarding your password.

A Summary of State Data Breach Laws
State laws regulating security data breach notification

Protecting Your BlackBerry
4 steps you can take to protect the data on your BlackBerry.

Securing Your Laptop on the Road
7 practical steps for protecting your laptop and sensitive data while traveling.

Home Office Security Checklist
This checklist from Microsoft will help protect your home office computers from spam, viruses, spyware, hackers and other Internet intruders.

Using Your Laptop at Starbucks
Are you taking a risk when you use your laptop at your favorite coffee shop? This article will show you how to safe in a hotspot.

Securing Outlook
Outlook and Outlook Express are two of today's most popular email and productivity applications. They also present unique security threats. This article will show you how to make them more secure.

7 Steps to Improved Computer Security
Microsoft has published a 7 step process for improving computer security. Developed with the small business owner in mind, this an easy-to-read introduction to basic computer security.

10 Physical Security Measures for Your Server Room
Some organizations, distracted by the more sophisticated features of software-based security products, overlook the importance of protecting the network and its components at the physical level. Here are 10 things you can do now to secure your server room.

Small Business Privacy and Security
Most businesses store personal information such as names, addresses, social security numbers, credit card numbers and other account numbers. Depending on the type of data you are collecting, and who you are collecting it from, you may be subject to federal and state privacy laws. This guide explains which privacy laws apply to your business and how to comply with them.

Online Security Tips
How to defend yourself against 3 common online attacks

The LifeLock Files
An inside look at a pioneering security company

Not Only For Profit, Hacking has Become a Powerful Tool for Protest
Hacking has become the new sit-in.

Creepy Technology
A short anthology of some interesting and inventive methods being developed to steal data and identities.

The 5 Dumbest Hacks of All Time
Five of the dumbest hacks ever attempted.

How to Redact a PDF File
How to redact a PDF file and effectively remove sensitive information.

GPS Tracking: An Invasion of Privacy?
The Supreme Court's unanimous decision in the United States v. Jones GPS tracking case has been hailed as a victory by privacy rights advocates. But many difficult questions remain unanswered.

Preparing for Changes to Google's Privacy Policy
Preparing for changes to Google's privacy policy

Protect Yourself from Social Engineering
A look at some common social engineering attacks, and how to protect yourself.

Your Own Private Google
Personalizing your privacy settings, and other ways to use Google anonymously

How to Maintain Your Privacy in the Information Age
How to protect your privacy in an information driven society.

Penetration Testing: What Is It? Do I Need It?
An introduction to penetration testing,and how it can help protect your business.

©2014 About.com. All rights reserved.