Skip to content
No results
  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

 

Report Cyber Attack

Call us at (406) 382-9207

  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

  • Uncategorized

Weekend Reading: May 18th Edition–IE9 Powers “Prometheus” and “Brandon Generator” Experiences, Three Hot Windows Phone Apps & Skype Rolls Out on Xfinity in 10 Markets

In this edition of Weekend Reading, we’ve got stories on two awesome HTML5 experiences powered by Internet Explorer, three gorgeous new apps for Windows Phone, Skype rolling out on Xfinity in 10 markets and much, much more. Don’t miss any o...

  • Brady Phenicie
  • May 18, 2012
  • Uncategorized

Tougher road ahead for fed data-center consolidation

Many government departments and agencies have rid themselves of the most obvious efficiency offenders: small data centers, facilities previously marked for closure and IT resources deemed surplus to mission requirements.

  • Brady Phenicie
  • May 18, 2012
  • Uncategorized

The 5 most common online swindles

Cyber criminals took people for $485 million in 2011 through a variety of scams, the Internet Crime Complaint Center reports. Here are common tactics to watch out for.

  • Brady Phenicie
  • May 18, 2012
  • Uncategorized

If software patches are important, why do so many ignore them?

The continued presence -- and exploitation -- of known vulnerabilities suggests that some executives have decided that installing software patches is not worth the effort.

  • Brady Phenicie
  • May 18, 2012
  • Uncategorized

City's mobile method: Central management, full-disk encryption and no BYOD (yet)

Fresno, Calif., automates the task of tracking and controlling its network endpoints, both stationary and mobile.

  • Brady Phenicie
  • May 17, 2012
  • Uncategorized

Android malware growing at 'staggering' pace, report states

Families of Android malware quadrupled in the past year, while the files used to distribute the malware skyrocketed from 139 to 3,063, according to a report from F-Secure.

  • Brady Phenicie
  • May 17, 2012
  • Uncategorized

Tool provides out-of-the box FedRAMP compliance

Agilance's Federal Risk and Authorization Management Program Content Pack includes the baseline security controls required of cloud service providers.

  • Brady Phenicie
  • May 16, 2012
  • Uncategorized

Medicine's mobile mania raises the threat level, DHS warns

Mobile devices are ideal for many medical uses, but they also can put patient records, and sometimes even patients themselves, at risk, according to a DHS report.

  • Brady Phenicie
  • May 16, 2012
  • Uncategorized

10 recommendations for securing the IT supply chain

NIST's streamlined guidance on risk management focuses on a set of key recommendations for ensuring the security and reliability of information and communications systems.

  • Brady Phenicie
  • May 16, 2012
  • Uncategorized

Smart-grid security could benefit from Microsoft's SDL framework

A major vendor of energy system control and smart metering systems is adopting Microsoft's Security Development Lifecycle to help ensure better security.

  • Brady Phenicie
  • May 16, 2012
Prev
1 … 167 168 169 170 171 172 173 … 230
Next

Copyright © 2025 - Phenicie Business Management