Skip to content
No results
  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

 

Report Cyber Attack

Call us at (406) 382-9207

  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

  • Uncategorized

'Hit man' phishing scam makes an offer you can refuse

Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.

  • Brady Phenicie
  • July 27, 2012
  • Uncategorized

Mass. health authority uses ID software to prevent fraud

The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.

  • Brady Phenicie
  • July 27, 2012
  • Uncategorized

New ‘Universal Gateway’ speeds data to Navy vessels

Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.

  • Brady Phenicie
  • July 26, 2012
  • Uncategorized

Ex-FBI cyber sleuth: Government 'gets it,' but it will take time

Former FBI official Shawn Henry said government understands the need to be more forthcoming with cyber intell, but creating the necessary legislative and policy framework is complex.

  • Brady Phenicie
  • July 26, 2012
  • NEWS

New tool spots hacking vulnerabilities in smart meters

Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.

  • Brady Phenicie
  • July 26, 2012
  • BUILD, Developers, Visual Studio, Windows 8, Windows Azure, Windows Phone

Announcing BUILD 2012

In January, we shared some thoughts on our approach to developer events, including a commitment to come back with more on our plans for an event this coming fall. Well, here it is: our next developer conference will be this fall, and it's (again) calle...

  • Brady Phenicie
  • July 25, 2012
  • Developers, Internet Explorer, Office Web Apps, SkyDrive, Windows 8, Windows Azure, Windows Phone

The Midweek Download: July 25th Edition–Graphics in Windows 8 & Getting Started with the New Office Preview

In this edition of The Midweek Download, we’ve got stories on the graphics platform in Windows 8, a profile of the thin and slick Samsung Series 9 laptop and a great Getting Started Guide for the new Office Preview.
Hardware accelerating everythi...

  • Brady Phenicie
  • July 25, 2012
  • Uncategorized

Black Hat: If it ain't broke, it's just a matter of time

This year's Black Hat Briefings will tackle OS security — or lack of it — in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.

  • Brady Phenicie
  • July 25, 2012
  • Uncategorized

Big data system ready to handle fed intell, surveillance sensor data

The system integrates DataDirect Networks’ Web Object Scaler cloud storage appliance with YottaStor’s mobile computing and big data storage system called YottaDrive.

  • Brady Phenicie
  • July 25, 2012
  • Uncategorized

Windows 8: A secure OS for government?

Security in the latest version of Microsoft’s operating system beats previous releases by “leaps and bounds,” according to researchers at the Black Hat Briefings.

  • Brady Phenicie
  • July 25, 2012
Prev
1 … 151 152 153 154 155 156 157 … 230
Next

Copyright Š 2025 - Phenicie Business Management