Category Archives: Tech Zone
Cyber Warfare – Fear is the Real Threat
Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.
Why FAX is still an essential element in corporate environments
Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …
5 tips for identifying signs of malware
We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and …
The Lurking Threats in Free Services
It is a common trend that public institutions such as universities, libraries or similar offices offer free facilities to the public such as providing public computers with internet connection. Generally a USB port is recognized as a standard feature on …
Best Practices for Patch Management
The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …
7 Ways to Monitor your Local Network
Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …
How safe is the Internet in reality?
In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …
DNS Blacklists: What are they, how do they work and why do we need them?
I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …
A Look into Insidious Threats – The Logical Bomb
Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers. The reason for this is that these are by far the most common threats an …
How to create a very strong password
Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …









