Skip to main content

Home/ Corliss Tech Review Group/ Group items tagged put

Rss Feed Group items tagged

Queeniey Corliss

Corliss Group Review Heart Bleed Bug Test: Three Things One Can Do Yahoo, Facebook, Gma... - 1 views

  The Heartbleed bug isn’t a “virus,” but a security error. The bug can be tested on Github and a website was set up to test out whether the bug affects a certain website, in...

Corliss Group Review Heart Bleed Bug Test: Three Things One Can Do Yahoo Facebook Gmail eBay TurboTax Twitter Chase Wells Fargo Citibank Affected?

started by Queeniey Corliss on 18 Apr 14 no follow-up yet
Queeniey Corliss

The Corliss Technology Review Group, Rare material shortages could put gadgets at risk - 1 views

Modern technology is too reliant on rare materials whose scarcity could drastically set back innovation, a new report has warned. It suggested that as more and more devices are manufactured, supp...

the corliss technology review group Rare material shortages could put gadgets at risk

started by Queeniey Corliss on 17 Dec 13 no follow-up yet
Queeniey Corliss

5 File Sharing Dangers by the Corliss Group Tech Review - 1 views

  •  
    Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk - but it frequently is. Because many small businesses don't have the right file-sharing systems and policies, many turn to unsafe practices that often put both their business's and clients' privacy in jeopardy. Is your business guilty of engaging in dangerous file sharing habits? Here are five you need to watch out for and what you can do about them. 1. Sharing files via email The most obvious dangerous habit is sharing files via email. Just the other day I received a design document from a client as an email attachment. 2. Using consumer-grade cloud solutions Workers around the world are putting themselves and their employers at risk by indiscriminately using unauthorized file sharing services on their mobile and desktop devices - to the tune of $2 billion. With more workers joining the bring-your-own-device (BYOD) revolution and turning to insecure file sharing services like personal Dropbox and Google Drive accounts, the threat is greater than ever. 3. Peer-to-peer (P2P) file sharing P2P sharing is a great technology used to share data over peer networks. It's also great software to get hacked. 4. Using flash drives Flash drives are the easy tool of choice for infection since they bypass network security. If an infected file is on a flash drive and inserted into a system, it can start an infection spread from the PC. 5. Lack of visibility The danger starts when employees take matters into their own hands and engage a file sharing service on their own. The individual making a one-off decision is not going to be thinking of the bigger picture of organization-wide requirements.
Queeniey Corliss

The Corliss Group Latest Tech Review - Protect Your Assets By Practicing Common-Sense C... - 1 views

Let's get the scary stuff out of the way upfront: Cybercrime costs the global economy $575 billion annually, according to reports. The United States takes a $100 billion hit, the largest of any cou...

started by Queeniey Corliss on 16 Apr 15 no follow-up yet
Queeniey Corliss

The Corliss Group Latest Tech Review: Cybercriminals Have Your Number, But Which One? - 1 views

The Star Wars Cantina of cybercriminals targeting your identity, health care, finances and privacy today might seem like a movie you've seen so many times you could lip sync the entire thing. Never...

The Corliss Group Latest Tech Review Cybercriminals Have Your Number But Which One?

started by Queeniey Corliss on 04 Jun 14 no follow-up yet
Hannah Minske

Two lighter laptops for the heavier workload - 2 views

image

Two lighter laptops for the heavier workload

started by Hannah Minske on 29 Jan 14 no follow-up yet
Queeniey Corliss

The Corliss Group Latest Tech Review: Logitech K480 Keyboard Works with Anything You Own - 1 views

  •  
    It's a truth as universal as it is annoying; if you want all your devices to work with a specific keyboard, well, you'll probably need either one for each, sign on for precisely one device ecosystem, or get used to swiping in words. Travelers in particular are driven insane by this problem, so Logitech decided, quite cleverly, to solve it with the K480. Swiss Army Keyboard There are two problems with modern portable keyboards. The first is, as we noted, device compatibility. Ask anybody who's had to install drivers just to get a basic keyboard to work, the various device ecosystems out there don't play well with each other and seemingly want to drive you insane. Logitech solves this with some clever design. You can switch between three different places to send your words, so that regardless of whether you're all Apple, or a mix of Apple, Chrome, and Windows, you'll be able to use the keyboard and get the point across. Basically, if it uses Bluetooth, you're all set to type. At The Trough The second problem is keeping all your stuff organized; you've got your phone over here, your tablet over there, and your laptop in front of you… and many keyboards want to be docked solely at your tablet. How does Logitech solve this? Simple: It puts a trough at the top of the keyboard that can easily be used to stand up both your tablet and your phone, and to type away at both of them with ease. A Keyboard For The Multitasker Multitasking, or at least sorting through your various tasks properly, can be a profoundly annoying experience, and Logitech deserves credit for looking at how we actually use our gadgets and creating a keyboard that fits in with them. If that's something you need, it starts at just $50.
Queeniey Corliss

Microsoft finally unveils its new browser called Edge - 1 views

At last the long wait is over, Microsoft finally reveals its official name for its new web browser plans last January, dubbed as Microsoft Edge, which is previously code-named Project Spartan. Mic...

The Corliss Group Latest Tech Review

started by Queeniey Corliss on 22 May 15 no follow-up yet
Queeniey Corliss

The Corliss Review Group: What are the top security concerns when moving to the cloud? - 1 views

The Corliss Review Group: What are the top security concerns when moving to the cloud? techradar.com Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for conce...

Corliss Review Group What are the top security concerns when moving to cloud?

started by Queeniey Corliss on 25 Mar 14 no follow-up yet
Franchezca Mindaine

Corliss Tech Review Group Study: External audits not an effective tool for against fraud - 1 views

Corliss Tech Review Group Study: External audits not an effective tool for against fraud Investors, corporate executives and analysts depend on external audits to maintain honesty in business orga...

Corliss Tech Review Group Study: External audits not an effective tool for against fraud

started by Franchezca Mindaine on 04 Jun 14 no follow-up yet
1 - 20 of 22 Next ›
Showing 20 items per page