957 Results for:USB

  • Sort by: 

USB storage devices: Two ways to stop the threat to network security

By Brien Posey 21 Oct 2007

USB storage devices pose a significant threat to network security. This tip discusses some basic strategies for blocking unauthorized USB device use. Read More

Qualcomm unveils video collaboration platform suite

By Joe O’Halloran 15 Jun 2023

Mobile technology giant unveils suite of artificial intelligence-based platforms focused on collaboration devices to accelerate design and deployment of variety video-conferencing product Read More

Western Digital restores service; attack details remain unclear

By Arielle Waldman 13 Apr 2023

While Western Digital confirmed that it suffered a data breach on March 26, the storage company has not offered details about the attack scope or whether ransomware was involved. Read More

A look at how IoT and embedded systems work together

By Dan Jones 15 Aug 2022

Embedded systems are a necessary part of IoT devices. Read more about how they work, their components and how to select the right type for an IoT device. Read More

Desktop video conferencing hardware now built for hybrid work

By Katherine Finnell 05 Oct 2022

Desktop video hardware offers organizations hybrid work benefits, including high-quality video for home workers and simplified IT management. But getting buy-in can be a challenge. Read More

Best practices for using Outlook .PST files on portable USB drives

By Serdar Yegulalp 19 Dec 2007

You can save Microsoft Outlook email data in a .PST file to a portable USB storage drive, but make sure you understand these best practices first. Read More

Malware vs. ransomware: What's the difference?

By Andy Patrizio 31 Aug 2023

Ransomware is a type of malware, or malicious software. While all ransomware is malware, not all malware is ransomware. Read More

How to choose the right PC for business

By Ed Tittel 13 Aug 2021

With seemingly endless options to choose from, finding the right PC for a business can feel daunting. Explore these top seven choices below. Read More

Top tips for remote and mobile workers to improve their cyber security

By Peter Wood 27 Apr 2015

Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Read More

Get started with ESXi Fling on Arm architecture

By Vladan Seget 26 Jan 2022

Arm architecture brings benefits of energy efficiency as well as edge use cases. Read up on how to get the right ISO files and hardware to properly run ESXi Fling. Read More