Category Archives: Tech Zone
Top 3 Patch Management Do’s and Don’ts
A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …
4 Reasons for Implementing Patch Management Software
Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …
How Events Monitoring can Prevent IT Disasters (Part 3)
In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …
How Events Monitoring can Prevent IT Disasters (Part 2)
In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …
How Events Monitoring can Prevent IT Disasters (Part 1)
An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …
Can Companies Defend Against Targeted Attacks? (Part 2)
In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary – why were they apparently so easy to …
Can Companies Defend Against Targeted Attacks? (Part 1)
The story with all the interesting details about how security company HBGary was hacked earlier this month, published by Ars Technica last week, has made quite some noise with people concerned about IT security. It is a perfect – by …
A Quick Look at On-Premise E-mail Archiving
In a previous post, I discussed the concept of e-mail archiving in the cloud and ran through some pros and cons of hosting your e-mail archive off-site. Today we’ll take a quick look at on-premise e-mail archiving. Having an on-premise …
5 Threats to Watch out for when Using a Public Machine
Recently I wrote an article highlighting steps to take if you provide public computer access to your customers to ensure their security. The news then broke out that hardware key loggers were found at public libraries in Manchester. Public libraries …
Top Most Vulnerable Applications and Operating Systems in 2010
Analyzing the data on 2010 from National Vulnerability Database reveals some interesting statistics.










