IT and Computer Technology Articles
Microsoft recently searched a blogger’s Hotmail account to find the person who leaked copies of Windows 8 and anti-piracy software. The leaker, who turned out to be an ex-Microsoft employee, was arrested and charged shortly after the search revealed his identity. John Frank, Microsoft’s VP and deputy general counsel, said the company searched the blogger’s…Read more »
Every major browser offers some type of private browsing mode: On Safari and Firefox, it’s called Private Browsing. On Google Chrome, it’s called Incognito Mode. On Internet Explorer, it’s called InPrivate. These modes are designed to keep your online activity safe from prying eyes. Despite different names and companies, all private browsing modes work in…Read more »
Yahoo is improving their security for Yahoo Mail users with automatic encryption. On January 7th, Yahoo enabled automatic HTTPS as the default for all users on their network. Plus they now use 2,048-bit encryption keys to secure certificates for encrypted communications between Web browsers and servers. Yahoo is attempting to increase encryption across all of…Read more »
Information security is a huge concern for organizations of all kinds. While information security is critical to achieve, it’s increasingly challenging to maintain. Firewalls, antivirus, access control and perimeter monitoring are important security measures, but today’s sophisticated cybercriminals are finding ways to bypass them and directly target data, applications and devices. The good news is…Read more »
As a business owner, you rely on your smartphone to connect to employees, vendors and customers. Apple’s iOS and Google’s Android are the most popular smartphone choices, but which one is right for your business? Business Use Apple In the third quarter of 2012, Apple’s iOS was the most popular platform for businesses that interact…Read more »
Agile IT Solutions is committed to serving our business community. Please enter your contact information and we will call you.