Author Archives: Ed Fisher
4 Reasons to monitor Internet usage within your organization
If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take …
It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?
I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our …
The 16 Most (Potentially) Dangerous Applications on your Network
System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% …
How to repair PST files
One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …
Top 3 Patch Management Do’s and Don’ts
A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …
10 Tips for Successful Email Archiving
While companies with unlimited storage, tiers of redundant servers, and high-speed WAN links may want to provide unlimited online storage for their users, the rest of us have to contend with budgets, hardware limitations, and bandwidth that is never enough. …
6 Tips for a Successful Patching Process
Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With …
5 Popular Hacking Techniques – Do you know your enemies? (Part 2)
Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched …
5 Popular Hacking Techniques – Do you know your enemies?
“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …










