Category: Security
Emergency Plan for Active Shooter Interagency Security Committee (ISC) has released a public version of the previous Federal government version of a document titled Planning and Response to an …
Affidavit of Cybersecurity Compliance Small business owners must protect their computer systems and confidential information from destruction, tampering, loss and theft. The National Institute of Standards and Technology (NIST) …
Backup Files to Micro SD Memory Card As the storage capacity of micro SD memory cards has greatly increased, now up to 200 GB, they can be used as …
Data Security Breach Notice Colorado law CRS 6-1-716 requires notice to consumers of a data security breach. It is part of the Colorado Consumer Protection Act. A data security …
Document Destruction, Personal Identifying Information The Colorado Consumer Protection Act, CRS 6-1-713, regulates document disposal and destruction of paper and electronic documents containing “personal identifying information” (PII). Personal Identifying Information, …
Cobra CXT545 28-Mile Two-Way Radio The Cobra® CXT545 is a 28-mile range two-way radio (walkie-talkie). It has 22 UHF/FM radio channels. Channels 1-7, on high power setting, and channels …
Kaito KA360 Voyager DX Emergency Radio The Kaito® Voyager DX KA360 Emergency Radio receives AM, FM, and NOAA® weather broadcasts. It includes a super bright 3-LED flashlight. Price: $30 …
Cybersecurity Standards for Small Business, NIST IR 7621 Small businesses should follow the information security (cybersecurity) standards published by the National Institute of Standards and Technology (NIST®), in Interagency …
Virtual Private Network (VPN) for Security An open, public Wi-Fi or hotspot at a hotel, airport, coffee shop, restaurant, library, etc., provides a convenient free internet connection, but is …
Air Gap Computer Network Security An air gap or air wall is a computer network security measure. Rather than have all your computers connected to a single local network, …
YubiKey for Computer Security A YubiKey is a small, rugged, digital key that plugs into a USB port on your computer. It is used to generate a secure one-time …
Archiving Email with Outlook Microsoft Outlook includes a useful feature to archive your email. This allows you to remove email stored on a third-party internet email server and move …
Security Now with Steve Gibson “Security Now“, is a weekly computer security oriented talk radio program. Recorded shows are available by free podcast subscription or by downloading a netcast …
Domain Name Server (DNS) Privacy You must choose a specific Domain Name Server (DNS) to maintain privacy. Due to a lack of privacy, many computer users are switching from …
StartPage or DuckDuckGo for Private Web Search Due to news and concerns about snooping, spying, data collection and lack of privacy, many computer users are switching from using the …