Endpoint Protection
Endpoint Protection | News, how-tos, features, reviews, and videos
The fax is still king in healthcare — and it’s not going away anytime soon
Fax machines and servers may be old tech, but they're trusted. And, until someone comes up with a more secure and prolific method for transmitting patient information and prescription requests, the aging systems aren't going anywhere. ...
15 Android settings that'll strengthen your security
Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover.
Google urges users to update Chrome to address zero-day vulnerability
Google has released Chrome version 112.0.5615.121 to address a vulnerability that can allow malicious code execution on Windows, Mac, and Linux systems.
Q&A: Cisco CIO Fletcher Previn on the challenges of a hybrid workplace
Securing Cisco's networks, creating and maintaining company culture, and dealing with a dearth of IT talent are among the difficult issues with which Cisco CIO Fletcher Previn says he's grappling.
Microsoft Intune Suite consolidates endpoint management and protection
Intune Suite will streamline endpoint management with added features for controlled and secure access.
The best privacy and security apps for Android
Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.
The best Android password managers
Not all Android password managers are created equal — so which one makes the most sense for you?
Apple finally adds encryption to iCloud backups
Apple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple...
What is Managed Device Attestation on Apple platforms?
Announced at WWDC 2022, Managed Device Attestation protection shows that Apple embraces the need for endpoint security.
Italian spyware firm is hacking into iOS and Android devices, Google says
RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.
Windows 11: Should you bypass the hardware block?
Strict hardware requirements block many machines from upgrading to Windows 11. There’s a way around that block, but should you use it? Here’s what to consider.
Jamf adds network and endpoint security tools for enterprise Macs
Jamf has unveiled a series of significant updates designed to improve Mac enterprise security, and touted additional security solutions.
Microsoft Defender for Endpoint brings remote deployment to iOS
Microsoft has taken another step toward making life considerably easier for enterprise admins seeking to secure fleets of remote iOS devices at the endpoint.
Android security checkup: 16 steps to a safer phone
Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.
Knowledge Pack
Excel 2016 and 2019 cheat sheet: Ribbon quick reference
Our visual guide helps you find the most popular commands on the Ribbon in Excel 2016 and 2019 for Windows, along with keyboard shortcuts for performing each action.
Knowledge Pack
PowerPoint 2016 cheat sheet: Ribbon quick reference
Our visual guide helps you find the most useful commands on the Ribbon in PowerPoint 2016 for Windows, along with keyboard shortcuts for performing each action.
Knowledge Pack
Best Places to Work in IT archives, 1994 to 2018
See 25 years of Computerworld's Best Places to Work in IT lists in an easy-to-sort spreadsheet.
Knowledge Pack
Download the 2018 Best Places to Work in IT special report
Our 25th annual report highlights 100 top organizations across the country that attract skilled tech professionals by offering robust salaries, stellar benefits, and flexible, fast-paced work environments.