Tech Zone

Page 19

How to Detect Network Intruders (Part 2)

In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client machine that is part of a corporate network. There are many ways in which malicious code can […]

Continue reading

How to Detect Network Intruders (Part 1)

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your corporate network from unwelcome visitors? It is well known that the internet is not the […]

Continue reading

How to repair PST files

One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is highly important. Of course, it would be even better if you knew how to avoid […]

Continue reading

Why the Need for Internet Monitoring?

There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for a moment; it’s a popular attack vector that’s been used by malicious hackers for quite […]

Continue reading

How End Point Security Software Can Prevent Data Theft

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT infrastructure. Recent incidents such as Wikileaks are a very good example of why data theft […]

Continue reading

The Importance of Using Multiple Passwords

One of the most hated security policies is that of asking users to have different passwords for each different service they make use of. Many see this as unnecessary because they reason that if their chosen password is strong enough then having multiple passwords is an unnecessary precaution.  Worse still, it is not just everyday […]

Continue reading

Top 3 Patch Management Do’s and Don’ts

A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, and a few key things that can really cause you problems. Here are the top […]

Continue reading

4 Reasons for Implementing Patch Management Software

Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain hot fixes which safely close security vulnerabilities in software. It is highly recommended to install […]

Continue reading

How Events Monitoring can Prevent IT Disasters (Part 3)

In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management system and a fax server) installed on one main server. These applications are very common […]

Continue reading

How Events Monitoring can Prevent IT Disasters (Part 2)

In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of pre-processing events represents the most important part of events monitoring, because this process will decide […]

Continue reading

Find us on Facebook

Follow us on Twitter