Skip to content
No results
  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

 

Report Cyber Attack

Call us at (406) 382-9207

  • Home
  • Events / News
  • Remote Monitoring
  • Solutions
    • Secure Cloud Backup
    • Managed IT Services
    • Computer Service and Repair
    • Threat Detection MDR
    • Security for Office 365
    • Endpoint Detection and Response
    • Wireless Networking
    • Cybersecurity Compliance
    • VoIP Solutions
  • Contact
    • About Us
    • Who we partner with
    • AI use Policy
    • Privacy Policy
  • Professional Certifications
    • Security Docs
  • Penetration Testing
Phenicie Business Management

Cyber Security and IT support for Small Business

  • Industry Partner

Microsoft Recognizes Outstanding Contributions by Suppliers

The Microsoft Preferred Supplier Program announces winners for the 2011 MPSP Excellence Awards.

  • Brady Phenicie
  • March 12, 2012
  • Uncategorized

Why so many bad passwords? Because the rules allow them.

In many systems, "Password1" meets the same complexity requirements as "X$nc*(2^4." If you had to remember it, which would you use?

  • Brady Phenicie
  • March 12, 2012
  • Uncategorized

FISMA guide updated to reflect APT, mobile threats

NIST's revision of Special Publication 800-53, a foundational document for FISMA compliance, also now covers recent threats posed by the cloud.

  • Brady Phenicie
  • March 12, 2012
  • Uncategorized

China suspected in Facebook scam against NATO officers

A fake profile for NATO's senior commander lured other officers into accepting a friend request, compromising personal information in the process.

  • Brady Phenicie
  • March 12, 2012
  • Uncategorized

Microsoft's March security bulletin to tackle six vulnerabilities

Microsoft's monthly security update will feature six items -- one labeled "critical," four "important" and one moderate.

  • Brady Phenicie
  • March 9, 2012
  • Uncategorized

Chrome succumbs to Pwn2Own hacks, issues patch

Google's Chrome Web browser fell to multiple exploits March 7 at CanSecWest security conference's Pwn2Own contest, ending its two-year winning streak at the hacker contest.

  • Brady Phenicie
  • March 9, 2012
  • Uncategorized

Lost your phone? Assume the worst, study finds

Symantec and Sprint "lost" smart phones in five cities and discovered that finders are likely to snoop through the contents, putting personal and corporate information at risk.

  • Brady Phenicie
  • March 9, 2012
  • Uncategorized

Can simulated attack on NYC power grid bridge the partisan divide?

The demonstration for senators is designed to stress the urgency of passing cybersecurity legislation sooner rather than later.

  • Brady Phenicie
  • March 9, 2012
  • Uncategorized

Can cybersecurity profit from corporate self-interest?

The telecom industry's insistence that all regulation is bad for security does a disservice to those who rely on critical infrastructure.

  • Brady Phenicie
  • March 9, 2012
  • Retail, Windows Embedded, Windows Embedded Standard 7

Intelligent Systems in Retail on Display at RetailTech Japan

Japan’s largest retail trade show features solutions that enable retailers to manage and analyze data and improve customer experiences.

  • Brady Phenicie
  • March 8, 2012
Prev
1 … 190 191 192 193 194 195 196 … 230
Next

Copyright © 2025 - Phenicie Business Management