At the file level, you can password protect an Excel workbook in two ways. You can determine who can get in and who can save changes.
Brandon Vigliarolo walks you through the steps of securing an Excel worksheet with a password in Microsoft Office 365.
A major cyberattack on Singapore's government health database compromised 1.5 million people's personal information, including the Prime Minister.
Adding the encrypt/decrypt right-click menu to the Ubuntu file manager is easy. This illustrated walk-through will show you how.
At the 2018 LiveWorx conference, Kevin Lee, head of marketing for Samsung ARTIK IoT, explained why IoT manufacturers need to consider both hardware and software security in their products.
The Appthority Pulse Report for Q2 2018 found that messaging apps were risky across Android and iOS.
Shape Security's 2018 Credential Spill Report reveals the severity of data breaches and offers insight to the lifespan of stolen information.
VPNs are becoming increasingly popular due to data privacy concerns, but a new report found that some aren't effective.
Research from Ben-Gurion University in Israel leverages 100 unique email features to provide a more robust method for detecting malware.
Certain US airports contain Wi-Fi network risks that could put your devices and company data in danger, according to a Coronet report.
Activity-Based Alerts for Google Cloud can help enterprises avoid unauthorized access to company data.
Enterprises must take a risk-based approach to stop cybercriminals, rather than only throwing money at the problem, according to Gartner.
Cybersecurity threats aren't just technical, but societal and political too. Here are the top threats to business in 2018, according to AlienVault.
A new report from Positive Technologies details the top threats facing businesses in a variety of sectors.
In the wake of Spectre and Meltdown, some organizations are diversifying their technology buys. Lenovo's new Ryzen-powered ThinkPads bring choice to business notebooks.
A new product launched by Proofpoint works to address a novel Office 365 attack vector that works even if single sign on or multi-factor authentication are enabled.
A highly targeted campaign against 13 iPhones used an open source mobile device management system to control devices, according to Cisco Talos.
Tech issues can lead to significant security risks, costs, and time delays. An expert offers IT pros three tips for reducing and possibly eliminating these outcomes.
Whatever cybersecurity technologies you have implemented, it's not enough. Unauthorized access remains a simple exercise for hackers. A new solution is needed.
New research from TrustArc revealed that, though companies are prioritizing GDPR compliance, some 53% are still in the implementation phase.
A number of iPhone X users say the phone's Face ID doesn't recognize them when they first wake up in the morning. Here's why.
If you've discovered that you can't install mcrypt as you once could, fret not. Here are the steps to take so you can get that oft-used dependency installed with the help of pecl.
FIDO is the pathway to the elimination of the password as we know it explains Tom Merritt.
FIDO is the pathway to nixing passwords. Tom Merritt explains why, because of the FIDO project, this dream is not only possible but getting closer.
Site Isolation has been remotely enabled to protect against Spectre and Meltdown vulnerabilities, but could lead to a performance tradeoff.
RDP access is being used as an entryway for hackers. Be careful yours doesn't end up for sale on the Dark Web.
According to an IBM report, a data breach can cost $3.86 million. Here are the main factors.
Nearly half of companies have experienced a cyberattack or data breach in the past year, according to a Sungard AS survey.