Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

binary code, magnifying lens, skull and crossbones
Tech Spotlight   >   Cybersecurity [CW]   >   A remote worker at her laptop.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to protect Windows Remote Desktop deployments

Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.

security audit - risk assessment - network analysis

Microsoft 365 Advanced Audit: What you need to know

Microsoft's powerful new auditing options will help detect intrusions and see what was accessed...if you've paid for the right licenses.

android anti virus security

Android security: Analysis, advice, and next-level knowledge

Expand your Android security knowledge with this comprehensive collection of level-headed resources.

Android Security Settings

11 Android settings that'll strengthen your security

Android's own native security options aren't always obvious — but they're absolutely worth your while to embrace and understand.

Android Smart Lock Trusted Places

How to fix Android's Smart Lock Trusted Places feature

A 60-second workaround to make Android's location-based Smart Lock start working again.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

Android Security

Android security checkup: 16 steps to a safer phone

Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Unified Endpoint Management

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

While C-level positions were all the rage when mobility was new in the enterprise, the role of CMO – while still somewhat prevalent – is now largely unnecessary and could even hurt your bottom line.

windows 7 logo in the rear view mirror

9 ways to use Windows 7 (safely) when support ends

With Microsoft's support ending in January, our Windows 7 Survival Guide for 2020 offers ways to protect your older machines that can't or won't be upgraded.

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

5 patch is the problem

Complex September update brings large Windows, browser and development tool patches

This September update cycle brings two zero-days and three publicly reported vulnerabilities in the Windows platform. Both browser and Windows updates require immediate attention and your development team will need to spend some time...

google chromebook in the enterprise buildings city getty images google

Will Chromebooks rule the enterprise? (5 reasons it may)

Google schooled Apple and Microsoft in the education market by growing market share from zero to 60 in eight years. Insider Pro columnist Mike Elgan examines whether Google can do it again in the enterprise.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

Load More