Security

5 Essential Web Hosting Features

Webhosting 101: 5 Essential Web Hosting Features Your Site Must Have

Launching your own website is a great way for businesses and individuals to get their products and opinions out to the greater world. A website can allow an individual to voice their opinions and thoughts in a venue that reaches far beyond their circle of friends, while it also allows a small business to reach …

Webhosting 101: 5 Essential Web Hosting Features Your Site Must Have Read More »

Internal Social Networks: The Next Evolution of the Intranet

Social networks are the backbone of social media, the places where we can virtually gather with likeminded professionals in different companies, locations, and industries. Leading platforms such as Facebook, LinkedIn, and Google+ are well known and understood. And they serve a great purpose for the vast majority of us. From the perspective of the enterprise, …

Internal Social Networks: The Next Evolution of the Intranet Read More »

Five of the Most Despicable Online Marketing Techniques

Enjoy today’s guest post from┬áTom Koh. Tom is an SEO enthusiast who runs his own internet business and is sharing some of the more unattractive SEO ploys he has run into during his time doing so. SEO can sometimes have a bit of a bad reputation. While good SEO is of course a perfectly legitimate …

Five of the Most Despicable Online Marketing Techniques Read More »

Twitter URL Shortener: Good Response to Phishing

The news sort of came out a bit under the radar, but Twitter announced a very interesting change they are implementing on their blog (March 9, 2010). Positioned as a response to phishing, they will be changing URLs in Direct Messages to their own twt.tl shortened redirects. Essentially, they can then track for bad behavior and block the URL altogether if the target web page is found to be malicious.

Information Security & the New Generational Gap

Since the RSA Conference is happening this week, I thought it would be different to do a piece that hits on both Real-time and Information Security. The following blog post is my own original work that appeared on The Network View, the official blog for Anue Systems, on November 12, 2009. It highlights some important sociological differences between the various generations of today’s adult population, and looks at how changing work habits and security need to find a workable balance.

Scroll to Top