Ed Tittel

Ed Tittel is a long-time technology writer, researcher and consultant. The author of numerous books and courses on Windows (including certification-oriented and end-user topics), he blogs weekly for Tom's IT Pro and three times a week on Windows topics for TechTarget at his Windows Enterprise Desktop blog. Contact Ed through his website at www.edtittel.com.

How to detect and remove a rootkit in Windows 10

How to improve Dynamic Lock in Windows 10 Creators Update

How to improve Dynamic Lock in Windows 10 Creators Update

Dynamic Lock is a convenient, if somewhat imperfect, new feature that uses the proximity of a Bluetooth-paired phone to handle Windows 10 device access. Here’s how a handy tool will give you more control over when the lock kicks in. ...

What is cyber insurance and why you need it

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

5 costly consequences of SMB cybercrime

5 costly consequences of SMB cybercrime

Cybercrime doesn’t affect only big businesses. Hackers are increasingly targeting vulnerable, smaller organizations, too. Learn more about how SMBs are targeted and the true costs of these crimes.

Your guide to compliance in the cloud

Your guide to compliance in the cloud

You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

6 ways to maximize your IT training budget

6 ways to maximize your IT training budget

Customized, in-house training often zeros in on topics relevant to your business. However, it comes with an equally high price tag. If your employees simply need to fill in knowledge gaps or get up to speed with a specific software...

The dangers of dark data and how to minimize your exposure

Untapped and neglected, dark data can pose security risks should it fall into the wrong hands, or range outside its owner's control.

How to choose the best vulnerability scanning tool for your business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to explain the cloud to end users

Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...

Leading-edge UTM: What C-level execs need to know

A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.

How Adobe is moving on from Flash to embrace HTML5

Adobe Flash is still widely used, but it's seen as obsolete in the face of HTML5. In response, Adobe is taking several steps to adapt and contribute to a HTML5 future without browser plugins.

How to ensure SAM and SLM compliance in mobile environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.

Load More