Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Debra Littlejohn Shinder

About Debra Littlejohn Shinder

DEBRA LITTLEJOHN SHINDER is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and client and server security over the last fourteen years. These include Scene of the Cybercrime: Computer Forensics Handbook, published by Syngress, and Computer Networking Essentials, published by Cisco Press. She is co-author, with her husband, Dr. Thomas Shinder, of the best-selling Configuring ISA Server 2000, Configuring ISA Server 2004, and ISA Server and Beyond. Deb has been a tech editor, developmental editor and contributor on over 20 additional books on networking and security subjects, as well as study guides for Microsoft's MCSE exams, CompTIA's Security+ exam and TruSecure’s ICSA certification. She formerly edited the Element K Inside Windows Server Security journal. She authored a weekly column for TechRepublic’s Windows blog, called Microsoft Insights and a monthly column on Cybercrime, and is a regular contributor to their Security blog, Smart Phones blog and other TR blogs. She is the lead author on Windowsecurity.com and ISAServer.org, and her articles have appeared in print magazines such as Windows IT Pro (formerly Windows & .NET) Magazine. She has authored training material, corporate whitepapers, marketing material, webinars and product documentation for Microsoft Corporation, Intel, Hewlett-Packard, DigitalThink, GFI Software, Sunbelt Software, CNET and other technology companies. Deb specializes in security issues, cybercrime/computer forensics and Microsoft server products; she has been awarded Microsoft’s Most Valuable Professional (MVP) status in Enterprise Security for eight years in a row. A former police officer and police academy instructor, she has taught many courses at Eastfield College in Mesquite, TX and sits on the board of the Criminal Justice Training Center there. She is a fourth generation Texan and lives and works in the Dallas-Fort Worth area.

Is IT too Important to Be Trusted to IT Pros?

Is IT too Important to Be Trusted to IT Pros?

on August 1, 2013

You didn’t always have to go to medical school and get a license from the state to practice medicine. The first licensing laws in the U.S. were passed in the 1800s but then repealed in most states, and many states …

Read the Full Story
4
The Endpoint Is a Moving Target

The Endpoint Is a Moving Target

on July 17, 2013

Once upon a time, when we talked about securing our networks from edge to endpoint, both ends of that route were pretty easy to define. Now not only has the perimeter blurred and blended so that it’s hard to determine …

Read the Full Story
0
Take Control from the Cloud

Take Control from the Cloud

on June 26, 2013

Way back in 2007, Microsoft invited me, along with several other writers from the IT community, to attend an “IT pro townhall meeting” in Redmond. I remember sitting in a room on campus, listening to Mark Minasi and George Ou …

Read the Full Story
1
Email Archiving Doesn’t Have to be a DIY Project

Email Archiving Doesn’t Have to be a DIY Project

on June 19, 2013

The “do it yourself” craze is big, and there’s a good reason for that. You can learn a lot, save money, and ensure that things get done your way. But there’s a down side, as well.  The success (or not) …

Read the Full Story
0
Networks without Borders: The New Security Paradigm

Networks without Borders: The New Security Paradigm

on June 5, 2013

In ancient times, cities were often walled fortresses, with heavily guarded perimeters, and strangers were closely scrutinized before being allowed to pass through the gates. Likewise, in the “old days” of computer networking, there were strict lines of demarcation between …

Read the Full Story
0
TMI/NEK: Too Much Information, Not Enough Knowledge

TMI/NEK: Too Much Information, Not Enough Knowledge

on May 24, 2013

“Knowledge is power” – scientia potential est in Latin – is an aphorism commonly attributed to Sir Francis Bacon. It’s true, but what we sometimes forget is that information (much less raw data) does not equal knowledge. Data consists of …

Read the Full Story
0
Fax 3.0: This is Not Your Father’s Facsimile Machine

Fax 3.0: This is Not Your Father’s Facsimile Machine

on May 1, 2013

Some of my younger friends may not have ever encountered an old-fashioned fax machine, but I remember them well. There was a time when it seemed nothing short of a miracle to feed a document into it and have someone …

Read the Full Story
1
Taming a Web Gone Wild

Taming a Web Gone Wild

on April 9, 2013

When Tim Berners-Lee first conceived of a system of interlinked documents that could be accessed over a world-wide network, nobody could have foreseen what a tangled Web we would weave. Today’s web is an amazing source of information and entertainment. …

Read the Full Story
0
Removable Storage: A Convenient Truth

Removable Storage: A Convenient Truth

on March 18, 2013

Removable storage devices offer a big convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card …

Read the Full Story
0
Is Your Email a Ticking Legal Timebomb?

Is Your Email a Ticking Legal Timebomb?

on March 11, 2013

A couple of months ago, I postulated here that, far from being dead, email is alive and kicking in business organizations around the world. We talked about how to secure those messages from attackers, but that’s only part of the …

Read the Full Story
0