The Security Holes Created by Default Windows User Accounts
If you are a computer user, you are probably viewing this article using a PC with a recent version of […]
Read MoreIs The Use of Remote Login Software Compromising Your Workplace Security?
As broadband becomes ubiquitous, many businesses are looking for ways to grant staff remote access via an internet connection to […]
Read MoreTracking Down E-Criminals: The Virtual Clues That Lead To The Physical World
Every time a computer user views a web page, uses instant chat or sends an email, details about their location […]
Read MoreThe Computer Forensic Investigation Of Peer To Peer File Sharing
As internet connection speeds continue to increase, sharing information via the internet has become commonplace. For small files, email is […]
Read MoreData Recovery Following Physical Damage To A Hard Disk Drive
In the last 20 years, computers have become a vital part of most business operations. As storage capacity and internet […]
Read MoreIs It Time For The Public Sector To Introduce Mandatory Data Encryption?
In 2008, at least eight separate incidents of data loss by large public service organisations were reported. This includes incidents […]
Read MoreProtecting Against Intellectual Property Theft By Ex-Employees
According to the Office of National Statistics, the number of unemployed people in Britain increased by 177,000 in the three […]
Read MoreDiscovery Of 2 Million Infected PCs Highlights Importance Of Adequate Internet Security
In April 2009, internet security firm Finjan announced its discovery of a network of 1.9 million malware-infected computers, which included […]
Read MoreThe Evidential Value Of Satellite Navigation Devices
Once a device associated only with taxi drivers, satellite navigation (Sat Nav) systems, which provide directions to drivers as they […]
Read More