Top

Blog

Driven TechnologyBlog (Page 74)

Beware the Kneber Botnet

A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies. Called the Knebner...

Manage and Collect Data Better with FormSpring

For businesses of all types and size, managing data online is critical to the smooth operation of a website. However, incorporating data collection programs can be time consuming, especially if any of your data is “time bound” – meaning it’s only valid and useful...

How to handle Suspicious E-mail

Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these guidelines to help protect...

SaaS: An Overview

The growing reach and power of the internet has changed the way people do business, with more and more web-based services popping up. One of these is SaaS. SaaS stands for Software as a Service, which refers to any licensed software being “rented” to...

Understanding the Value of Managed Services

Most small and medium businesses can’t afford the luxury of a qualified IT administrator, let alone an entire IT department. If you’re in this position, how do you maintain the information technology infrastructure that’s critical to your organization? One option is Managed Services, in...

Hackers Target Email, Blogs, Social Networking Sites

In a report by security firm Websense , an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media...

Mozilla Firefox Add-Ons Download Site was Harboring Malware

Mozilla , the organization behind the popular Firefox browser disclosed that two add-ons available for download on its website were vectors for Trojans that could compromise users’ computers. Add-ons allow users to extend and enhance the capabilities of Firefox beyond the default install. Normally...

Business Continuity Planning: Your Business May Depend on It

With the start of a new year, businesses commonly implement changes and launch new initiatives that have ramifications for your IT environment. Ignore them at your own peril. Chief among your IT considerations should be a Business Continuity Plan, or BCP, which will allow...

Is Your Business Ready for Tablet Computing?

Much has been said about the launch of Apple’s long awaited, new mobile device . Called the Apple iPad, the device promises to boost sales of a new category of computing devices called tablets. What are tablets? Tablets or tablet PCs are not new,...