This category features the latest in applications that can be used to run a customer’s business.


Peer-to-Peer Blog: Happy Birthday and the Here You Go Virus

The weakest link in any security implementation is always the user. After last week, if I were an IT manager, I would send out a reminder to not open e-mails from unknown people and never open an attachment from an unknown source.

The ID is: 72372