business.com receives compensation from some of the companies listed on this page. Advertising Disclosure

Home

Security

From antivirus software recommendations to cybersecurity tips, learn how to safeguard your business against potential attacks and scams.

Latest: Advice, Tips and Resources

Article
How to Protect Your Web Application – Even If You Don't Own Sensitive Data
By Jon Schram | July 20, 2018

Keep you web application and customer data secure by following these 4 steps.

Article
Why Business Are Still Sending Faxes in 2018
By Naoimi Young | July 16, 2018

For some businesses, faxing is more important than ever.

Article
Wireless Security In The Enterprise: Deploying WPA2-Enterprise
By business.com editorial staff | July 11, 2018

The IEEE 802.11ax draft standard promises improved range, throughput and resiliency.

Article
Cloud Encryption: Using Data Encryption in The Cloud
By business.com editorial staff | July 03, 2018

Data security remains a top concern in cloud adoption.

Article
How to Select the Right Encryption Key Management Solution
By business.com editorial staff | July 03, 2018

Encryption key management is a necessary component of effective data protection.

Article
5 Preventable Human Errors That Leave Your Company Vulnerable to a Cyberattack
By Alexandre François | May 21, 2018

Most cyberattacks stem from internal human error, but companies can protect themselves.

Article
How Companies Are Detecting Spear Phishing Attacks Using Machine Learning
By Andrew Goldberg | May 18, 2018

As phishing emails become more sophisticated, companies are turning to machine learning.

Article
5 Scams That Prey on Small Businesses
By Matt D'Angelo | April 11, 2018

Hackers are getting more creative. Learn how your business could be targeted.

Article
Has Your Company Secured These Overlooked Attack Vectors?
By Kevin Pickhardt | April 05, 2018

Many don't consider these three common security weaknesses.

Category
The Best VPN and Proxy Services of 2020
By Adam Uzialko | March 27, 2018

Here are the best proxy services, which, like a virtual private network (VPN), allow you to change your IP address to protect your privacy.

Article
How Crooks Hack Passwords and How You Can Protect Your Business
By David Balaban | January 31, 2018

The use of traditional passwords is a slippery slope for companies these days.

Article
WePay's John Canfield on Protecting Your Business From Scams
By Chad Brooks | October 18, 2017

WebPay CEO John Canfield says these are the new scams small business should watch for

Article
Connectivity and Security: Two Cornerstones of a Data-Driven Business
By Daan Pepijn | August 29, 2017

The amount of data businesses collect make them prime targets for cyberattacks.

Article
5 Ways to Protect Your Business From Common Types of Fraud
By John Canfield | August 28, 2017

5 tips to protect your business when dealing with payments

Article
The Costs of Mobile Payment Fraud and How to Avoid It
By Eran Feinstein | August 10, 2017

Stay up to date to protect your m-commerce customers

Article
Is Your Business Ready for a Catastrophic Cloud Failure?
By Daan Pepijn | June 09, 2017

Here are the best practices that help ensure the reliability of your cloud-based systems.

Article
How Real are the IoT Security Concerns?
By Maria Marinina | May 25, 2017

While there are real consequences for neglecting IoT security, it’s a mistake to feel as though nothing can be done about it. Users, network administrators and developers alike can take steps to make...

Article
Effective IT Security Is Crucial for Branch and Remote Offices
By Megan Totka | May 22, 2017

At the end of the day, a company's security is really only as strong as its weakest link.

Article
Endpoint Protection vs. Anti-Malware: What You Need to Know
By Andreas Rivera | April 17, 2017

Learn which cybersecurity solution is best for your business.

Article
Is Your Data Safe From Hackers?
By Adriel Desautels | March 01, 2017

Only if you think like a dedicated hacker, and maybe not then.

Article
Restaurant Security: A Guide to Getting Your Money's Worth
By business.com editorial staff | February 21, 2017

It's hard to determine the ROI you will get from increasing your restaurant security.

Article
10 Common Social Engineering Tactics Used by Attackers
By Jason Parms | July 25, 2016

Learn What Social Engineering Is and How to Protect Your Business From Predators

Article
How to Use Marketing to Regain Public Trust After a Data Breach
By Zachary Evans | July 07, 2016

More companies than ever are the victims of massive data breaches. Do you have a plan to recover if it happens to you?

Article
How to Integrate Application Security Testing Into the Agile Development Process
By Daan Pepijn | June 02, 2016

Testing and rooting out bugs are integral parts of any successful application development process. But what's the best way to go about it?

Article
Stay Secure: 5 Key Steps to Taking a Proactive Approach to IT Security
By Daan Pepijn | April 18, 2016

Despite the increasing activity of hackers and the rise of security leaks, many companies underestimate the cost of security threats.

Article
You've Been Hacked: Now What?
By Sarah Landrum | March 11, 2016

And about a third of chief information officers reported that they saw a 51 to 100 percent increase in cyber attacks in 2015.

Article
Prepare for the Worst: How to Create a Cyber Security Incident Response Plan
By Jason Parms | January 13, 2016

Effective CSIR Plan is an essential aspect of organizations in data governance strategy to make aware about current security readiness.