Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Answer Line
How Safe is WPA2-Secured WiFi?
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online bankingHow-To
Lock Down Your Wi-Fi Network: 8 Tips for Small Businesses
By default, Wi-Fi is not secure. But these best practices will help you lock down and encrypt your company's wireless connections, both in and out of the office.How-To
How To Lock Down Your Wireless Network
Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.Answer Line
Remove Hard-to-Kill Malware
Jane13434's PC is infected with something that three good security programs couldn't defeat.How-To
Get Started Managing Multiple PCs with Windows Intune
Discover Microsoft’s new cloud-based service to remotely secure, monitor, manage, and assist PCs via the Internet. Check out the features and see how to get started.Answer Line
Why You Need a Router
ZyrrahXD asked the Networking forum about the best way to split a home Internet connection between multiple computersTech Audit
Five Steps to Mobile Device Management and Security
As more employees bring smartphones and tablets to work, managing the devices, securing data, and fighting malware is critical.Answer Line
Speed Up Windows on What Should be a Fast PC
LiveBrianD asked the Windows forum for advise on improving performance on a slow PCHow-To
How To Encrypt Your Smartphone
Protect your photos, text messages, and other private data from prying eyes with these simple tips.How-To
How to Use BitLocker to Encrypt Your Hard Drive
Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.How-To
How to Use DiskCryptor to Encrypt Your Hard Drive
Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.How-To
How to Use TrueCrypt to Encrypt Your Sensitive Documents
Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.How-To
How to Encrypt Files With Your Windows PC
Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.Tech Audit
Want Better Wi-Fi? Five Things You Need
Before you buy new networking gear, determine if coverage and speed will be good enough for all the devices on your company's network.How-To
How to Email Like a Pro
With the right tools, services, and knowledge, you can master your inbox and message handling. Evolve from email user to email power user with these six tips.How-To
How to Set Up a Wireless Network Webcam
Here's how to set up a wireless network webcam to monitor your home remotely.How-To
How to Use Your iOS or Android Smartphone or Tablet as a Wireless Network Camera
Here's how to use the camera in your iPod Touch, iPhone, iPad, or Android smartphone or tablet as a network webcam.How-To
How to Set Up Your Own Remote Home Monitoring System
Here's how to use webcams and Android or iOS devices to watch your home, children, and pets from anywhere.Answer Line
Will One Antivirus Program Take Care of Your Security Needs?
Bvs1216 uses Microsoft Security Essentials. He asked the Answer Line forum if he needs to supplement it with additional protection.How-To
Improve Your Productivity With the Web
Many of us rely on the Internet to get things done. Here are some tips and services to help you work smarter and more productively on the Web.How-To
How to Set Up and Maintain a Wireless Workplace
A well-planned Wi-Fi network can greatly improve your small business's productivity, without sacrificing security or performance.How-To
Mobile Device Management for Small Business
When it comes to managing phones and tablets in your organization, working closely with a partner and establishing clear policies are the keys to success.Answer Line
Must I Give Up XP?
Spiderowych asked the Windows forum if he must upgrade from XP to Windows 7How-To
How to Recover a Lost Phone, Tablet, or Laptop
These terrific tools and tips can rescue your wayward mobile devices and keep your personal data from falling into the wrong hands.Answer Line
Turn a PC Off or Leave It On?
Atrrocket asked if it's best to shut off a PC every night or leave it onAnswer Line
Watch Out for Rogues
MikeWik's PC got infected with rogue malware. He asked the Antivirus & Security Software forum for help.Security Alert
Why GlobalSign Made the Right Move to Suspend New Certificates
Here's what GlobalSign's move means, and how to evaluate a certificate authority for your business website.How-To
Reader Q&A: Gmail Without Web Access, Too Much Security
Readers ask if they can access Webmail without an Internet connection, and whether using multiple security apps is a problem–the answers are yes and yes.Hassle-Free PC
Don’t Overload Your PC with Security Software
Too many security programs can slow down your PC and actually cause security problems. A better bet: stick with a minimal set of utilities.Answer Line
Is It Really Necessary To Logout of Web Sites?
Keith Stanley wants to know if he should logout of Web sites that require a loginSecurity Alert
How to Make Your Google Accounts More Secure
Gmail has been the target of recent hacking attacks. Here are four solid tips to bolster security for you Google account information.How-To
Reader Feedback: Taskbar Tip, Gmail Management, Antivirus Help
Readers ask for help on managing Gmail messages and speeding up antivirus scans–plus offer a quick way to pin folders to the Windows taskbar.Answer Line
Is Cloud-Based Backup Safe?
Melissa has her doubts about backing up online. Could her data be stolen?Hassle-Free PC
Prevent Your Anti-Virus Software From Choking on Zip Files
Zip files can be huge, wreaking havoc with your virus scanner–and potentially your PC as well. Here are two ways to work around the problem.Hassle-Free PC
Download the Latest Security Tools to Your Flash Drive with SSDownload
Talk about convenient! With this open-source gem on your flash drive, you can quickly and easily download all the latest versions of your favorite rescue utilities.Hassle-Free PC
One Easy Way to Keep Neighbors From Stealing Your Wi-Fi
What's in a name? When it comes to keeping cheapskate neighbors from pilfering your Wi-Fi, everything.How-To
Password Management: Idiot-Proof Tips
Only an alphanumeric string stands between a hacker and your bank account. Here's how to make sure your passwords are safe.How-To
Mobile Malware Reality Check
Smartphone malware isn’t yet as big a threat as you might think, but it’s coming. Here are some tips to help you avoid it.Answer Line
How Dangerous is Web Surfing?
Samantha asked about the likelihood of a web site infecting her PC, and whether certain types of web sites are more dangerous than othersHassle-Free PC
Recover a Stolen Laptop with Free LockItTight
Laptops get stolen every day. If you want to increase the chances of recovering yours without paying a monthly service charge, this service can help.How-To
How to Set Google+ Privacy Settings
For years, rumors have circulated that Facebook’s privacy blunders would cause a mass exodus, and some users say they feel safer using Google+. Elsa Wenzel shows you how to modify settings and keep your profile private.How-To
Google+ Updates Privacy Tools for All Users
Locking down a Google+ profile is available to any user of Google's social media field trial. Here's how to proceed.How-To
Tips for a Malware-Free Android Smartphone
With mobile malware on the rise, you can never be too careful with your device and your personal data.How-To
What Your IT Pro Knows About You–and Can Do to Your Company
Why worry about hackers half a world away? The biggest threat to your business may lurk within your walls, among the IT pros you trust most.How-To
How to Stay Safe on Campus: 5 Easy Tips
Keeping your PC and gear safe on campus isn't hard! Here are the steps you need to take in the dorm room, in the library, and in the classroom.How-To
How to Use Strong Passwords
Reduce your vulnerability to data theft and other hacker threats by creating and using robust passwords.How-To
How to Avoid Trouble on Public Computers and Wi-Fi
Reduce your exposure to malware and data theft by minimizing your use of public wireless networks and PCs.Tech Audit
Protect Your Company With Web Filtering Tools
For small businesses, a security overhaul usually starts with a firewall and antivirus software. In addition, enabling Web filtering can prevent both inbound and outbound security threats.How-To