Internet security bug affects two-thirds of the web. Take steps now to protect yourself and your clients
The iPad has provided welcome relief from lugging around heavy laptops and briefcases, especially when presenting to clients. Here are some of the most useful apps for keeping up with your clients' demands for information and service
Whether it's a cloud-based service, USB keys, external hard drives, network-attached solutions or external servers, there is no shortage of solutions available to protect your valuable data in the case of hardware failure or a physical disaster
Virtual personal assistants such as Apple's Siri and a bevy of others available for most smartphone platforms are useful, but they are not yet able to connect to other online services and carry out complex tasks on their own
There have been many recent instances of security breaches and lost sensitive information. Here are some steps you can take to ensure the critical data on your laptop, tablet, smartphone or memory cards are more difficult for cyberthieves to access
Wireless networks enhance productivity by making the Internet available on all of your office's devices however, there's a big risk that confidential data could be compromised. Here are some steps necessary to secure your wireless router
Scribbling on a notepad during meetings can be a chore and a distraction. New technology - such as smartpens and tablet apps - not only can improve your note-taking strategies but also help you record and manage what you've written
Security breaches and recent reports of snooping by the U.S. government have raised questions about the security of cloud-based storage companies. One solution is to encrypt your data beforehand
Toshiba's nifty new device is both a tablet and an ultrabook, thanks to a mechanism that lets the keyboard slide out from under the screen. The problem is the Windows 8 operating system, which is pretty but confusing
Forget about your dog's name or predictable numerical sequences. A sentence from your favourite book is far more difficult to hack