Similar Articles |
|
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes |
PC World December 2, 2007 Michael Lasky |
7 Things Your Company's IT Department Doesn't Want You to Know Companies restrict their employees' use of work PCs and networks for good reasons. But that doesn't mean there aren't safe and legal ways to circumvent some of the more draconian measures. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. |
CFO July 1, 2002 Scott Leibs & Alix Nyberg |
Seek and/or Destroy The problem with corporate e-mail... Companies get the instant-message... All quiet on the IT budget front... Software that covers your assets. |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
Fast Company Neal Ungerleider |
Snapchat To Users: Your Snaps And Chats Are Still Private An update to Snapchat's terms of service last week had users nervous that the company was storing copies of their messages. |
CIO June 15, 2005 |
Corporate Message Policies Fall Short Though more companies are training employees in the proper use of e-mail, more than a third of survey respondents either didn't know or weren't sure about the difference between electronic records that need to be retained and insignificant messages that may be deleted. |
Macworld August 15, 2005 Glenn Fleishman |
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. |
BusinessWeek March 22, 2004 Stephen H. Wildstrom |
Toughing Out The Junk-Mail Virus An insidious strain swipes e-addresses from your PC -- to spam your friends |
Macworld April 2003 Glenn Fleishman |
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. |
Bank Systems & Technology July 29, 2008 Kieron Dowling |
The E-Mail Archive Can Also Serve as a Security Solution Implementing an e-mail archiving solution will enable companies to detect security breaches by implementing rules and policies that will check each e-mail being sent and flag potential violations. |
CIO October 29, 2008 Kim S. Nash |
How Text Messaging and Facebook Can Get You in Legal Trouble It's hard to stop employees from using text messaging, Facebook and other online tools to talk about their work. But you can prepare to handle the consequences. |
PC Magazine March 7, 2008 Neil Randall |
Using Outlook on Multiple Machines A variety of options let you use your Outlook 2007 messages, calendar items, contacts, and tasks in multiple locations. |
PC Magazine March 2, 2005 Neil J. Rubenking |
Deleting Too Many Messages Gags Outlook Outlook can't bulk-delete more than 4,000 messages at a time from an Exchange-based account. But there is a workaround. |
PC World July 2004 Andrew Brandt |
Privacy Watch: Why Your Friends Believe You're Selling Viagra Spammers who forge your address on their junk messages can clog your inbox and harm your reputation. |
PC World October 2004 Andrew Brandt |
Privacy Watch: New Services That Peep Into Your Inbox Two companies track recipients' handling of any message that carries a snippet of HTML code. |
Entrepreneur December 2003 Mike Hogan |
Let's Chat Instant messaging hits the road with the release of some new devices. For example, Cingular Wireless Interactive Messaging PLUS lets you text chat on RIM BlackBerry 950 and 957 handhelds and Good Technology's G100 for $20 to $50 per month, depending on usage. |
Entrepreneur April 2004 Mike Hogan |
You've Got Mail . . . . . . Too much mail, that is. Tame your inbox--and get more from messaging--with an integrated system. |
D-Lib October 2006 |
Take Care in the Digital World How many users consider what they may be surrendering in the way of privacy for the conveniences afforded by new online services? |
PC Magazine February 17, 2004 Cade Metz |
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. |
Popular Mechanics October 20, 2008 John Brownlee |
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. |
PC Magazine September 15, 2003 |
Mass IM One billion messages here, one billion there, and soon you're a broadcaster. That's the thinking behind a new enterprise messaging service designed to turn instant messaging into instant broadcasting. |
InternetNews March 29, 2004 Robyn Greenspan |
IM Spam Expected to Triple As if spam wasn't annoying enough, unwanted messages are popping up on instant messaging screens too. |
PC World June 2004 Andrew Brandt |
Cut Off Instant Messaging Spam How to avoid 'spim' with the major IM packages. |
Inc. October 2005 John Fried |
Is Instant Messaging an Instant Menace? IM, e-mail's little brother, isn't just for teenagers anymore. But it causes some problems in a corporate environment. |
PC Magazine September 2, 2003 Brett Glass |
IM Security: Don't Get Fooled Instant-messaging clients leave your PC open to attacks. Here's how to close the holes. |
PC World September 2005 Andrew Brandt |
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. |
AskMen.com Jasper Anson |
E-mail Mistakes Don't let e-mail mistakes hurt your business reputation. |
PC Magazine October 14, 2003 Leon Erlanger |
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. |
Insurance & Technology May 18, 2004 Julie Gallagher |
SPIM Gaining Ground on Spam IM is becoming the conduit of choice for senders of unsolicited messages. |
InternetNews April 27, 2006 David Miller |
Bouncebacks: The Hidden Cost of Spam A nasty side effect of spam and e-mailed viruses is costing companies an estimated $5 billion per year in IT resources, according to security services company IronPort. |
Wired August 2006 |
How To: Secure Your Data Delete files forever, foil a snooping boss, and look busy at work. |
PC World May 2005 Kevin Savetz |
Inbox Tamers We scouted four Web services and four desktop clients to find out which have the best features and which do the best job of keeping your mailbox free of spam. |
Bank Systems & Technology December 1, 2006 Nancy Feig |
Instant Messaging Gets Delayed Treatment IM is spreading like wildfire in the business world because of its ability to provide real-time communications. One of the biggest questions surrounding business use of IM is whether to host your own service or use public IM services, such as AOL Instant Messenger. |
PC Magazine February 3, 2004 Leon Erlanger |
IM and P2P Security The explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network--and your company--safe. |
CIO November 1, 2002 John Edwards |
Sending a Message Instant messaging software goes corporate. |
InternetNews January 17, 2007 Ed Sutherland |
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. |
PC Magazine June 2, 2004 |
Creo Six Degrees 2.0 If it's as important to you to find the context of messages as it is to find the messages themselves, or if you need some hints to locate what you're looking for, Six Degrees is a good choice. |
CIO August 15, 2003 Eric Knorr |
Taming E-Mail How to keep your message archiving tasks from spinning out of control |
InternetNews November 21, 2005 Tim Gray |
Reuters Connects IM Players The new instant messaging service for financial institutions will save a paper trail for compliance purposes. |
InternetNews January 3, 2006 Clint Boulton |
Symantec Sets Sights on IMlogic Security software maker Symantec is offering to acquire IMlogic, the top provider of enterprise instant messaging software. |
PC World October 2002 Frank Thorsberg |
How Secure Is Instant Messaging? Companies balance convenience with safety concerns. |
AskMen.com Samuel Hui |
Effective And Efficient E-Mailing Here is a primer on how to minimize the hindrances presented by e-mail and maximize the opportunities it offers for clear and effective communication in the workforce. |
Insurance & Technology March 18, 2005 Anthony O'Donnell |
You've Got (potentially dangerous) Mail Insurance companies are learning to manage security issues with email and messaging. |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. |
PC World May 28, 2002 Frank Thorsberg |
Worms Crawl Toward Instant Messaging IM users should become more security-conscious as IM spreads across devices and invites viruses... |
PC Magazine April 20, 2005 Ryan Naraine |
The Lookout: AOL to Modify AIM Terms of Service The ISP plans to make three small but significant modifications to the terms of service for its AIM instant-messaging product to head off a firestorm of privacy-related criticisms. |
Investment Advisor August 2006 Claudio Pannunzio |
Four Rules to Drive Home Your Message What distinguishes highly successful financial advisors from less successful ones, regardless of their skills and industry knowledge? The answer is their ability to communicate the true value of their service offerings to their key constituencies. |