by Enstep Team | Feb 26, 2010 | News
Microsoft recently released a number of security bulletins and patches addressing vulnerabilities in Windows and Office that are of high risk to users. It’s widely believed that many will be exploited by hackers within the next 30 days. One of them could potentially...
by Enstep Team | Feb 25, 2010 | News
A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies. Called the...
by Enstep Team | Feb 23, 2010 | Articles
For businesses of all types and size, managing data online is critical to the smooth operation of a website. However, incorporating data collection programs can be time consuming, especially if any of your data is “time bound” – meaning it’s only valid and useful...
by Enstep Team | Feb 22, 2010 | Tech Tips
If you suspect that you’ve responded to a phishing scam with personal or financial information or entered this information into a fake Web site, take these steps to minimize any damage. Read more Published with permission from TechAdvisory.org....
by Enstep Team | Feb 22, 2010 | Tech Tips
Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow...