Skip to content
No results
  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

 

Report Cyber Attack

Call us at (406) 382-9207

  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

  • Uncategorized

To hackers, government users are phish in a barrel

Attacks against government systems rose again in 2011, and phishing campaigns were by far the most common source of security incidents, according to US-CERT.

  • Brady Phenicie
  • March 19, 2012
  • NEWS

Harvesting your data? Suit alleges there are lots of apps doing that.

A class-action lawsuit filed in an Austin, Texas, court the week of March 12 alleges some of the most-downloaded mobile apps are stealing personal information without users' knowledge. Just who is responsible? There are some pretty well known names, in...

  • Brady Phenicie
  • March 16, 2012
  • Uncategorized

Ceding data ownership for 'any-device' access is a risky trade

When we give up ownership of information and resources in favor of anywhere, any-device access, we risk trading down on security in the process.

  • Brady Phenicie
  • March 16, 2012
  • Uncategorized

Agencies way behind in using DNSSEC to secure .gov domains

More than two years after the deadline for deploying DNS Security Extensions in .gov domains, fewer than 60 percent of agencies have digitally signed DNS records to enable the security tool.

  • Brady Phenicie
  • March 16, 2012
  • Uncategorized

More satellites means more SATCOM gridlock

The rapid global growth of satellite operators is causing substantial interference problems, experts say.

  • Brady Phenicie
  • March 15, 2012
  • B. Kevin Turner, Business Decision Maker, Cloud Computing, Convergence 2012, Dynamics, Forecaster for Microsoft Dynamics ERP, ISV, Kirill Tatarinov, Microsoft Dynamics

Media Alert: Kevin Turner and Kirill Tatarinov to Open Convergence 2012

Join a live webcast of the Convergence 2012 keynote presentation Monday, March 19, at 9 a.m. CDT.

  • Brady Phenicie
  • March 15, 2012
  • Uncategorized

5 reasons you'll have a personal cloud by 2014

With the spread of mobile devices and apps, the personal cloud will replace the personal computer at the center of users' digital lives, according to a report from Gartner.

  • Brady Phenicie
  • March 15, 2012
  • Uncategorized

SIIA forms public-sector group to work with agencies on cloud

The association has launched a new membership group to help technology companies take advantage of the evolving federal investment in cloud-related technologies.

  • Brady Phenicie
  • March 15, 2012
  • Uncategorized

Want to be a cyber pro? DOD might have a scholarship for you.

The Information Assurance Scholarship Program provides full rides for graduate and undergraduate students, and military and civilian DOD employees, in exchange for commitments to stay with DOD.

  • Brady Phenicie
  • March 15, 2012
  • Uncategorized

The Madness: Nimda ninjas Anna Kournikova; Code Red escapes

Code Red and Nimda survive the second bracket of the Malware Madness 2012 tournament. Voting is on for the next round.

  • Brady Phenicie
  • March 15, 2012
Prev
1 … 188 189 190 191 192 193 194 … 230
Next

Copyright © 2025 - Phenicie Business Management