Security/Compliane

Incriminate Yourself!

Data protection is becoming more and more of a compliance requirement for organizations that surround themselves with confidential information (whether it be social security numbers, banking information, or eve...

Reliable Back Up and Setting Correct Expectations

Over the last five years I have seen a more passive approach to back up and disaster recovery.  Organizations are letting their data reliability take a back seat to system up-time and performance which is start...

Completely secure data transfer on the way?

I recently read an article that talked about the possibility of a completely secure data transfer using quantum entanglement. Essentially what that means in terms of computer data and packets is that the data b...

Archiving Email–Some Considerations

Businesses live and die by email. Orders are submitted, proposals are sent, meetings are scheduled, and deals are made through email. So emails have a tendency to accumulate rapidly. No one wants to delete emai...

Secure Email Encryption – Zixmail

BVA gets several requests month in and month out for a good way to send secure emails.  There is really no way to answer this with a cheap method.  There are a few great solutions out there though they can be a...

Fake Antivirus removal tool

Trend Micro has released a tool designed to target & help remove fake antivirus threats.  You can download the tool here Some of the threats it detects are: Alpha Antivirus Antivirus 2010 Antivirus Action A...

Malware Terminology

The Information Technology world has a definite jargon of its own, which can be confusing to both the end users and (sometimes) to the IT people themselves. One of our biggest problems these days is Malware (ma...

Setting up VPN On Your iPad/iPhone

If you are interested in setting up a Cisco IPSec VPN connection on your iPad, I have detailed some instructions on doing so. On the iPad itself, go to Settings > General > Network >VPN > Add VPN ...

Mac Users Beware Of Malware

Do you think your Mac is immune to malware infections? If you said Yes, you would be wrong. Although there may not be as much malware for a Mac as there is for Windows, you should still not be caught sleeping. ...