Category Archives: Tech Zone
Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?
It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. …
How to Avoid Becoming the Villain
Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …
Hear! Hear! Tips from THE IT Security Experts
We all have our take on IT security, and if you’re reading this post it means you want to hear more. So do we, that’s why we have reached out to some well-known IT experts in the security blogosphere and …
Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It
As I was flying home from a customer engagement, I looked down from the window of the airplane to see all the clouds floating lazily below me. It was not a completely overcast day, so I could easily see the …
13 for ’13 Jumpstart: Upgrades
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013 in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help …
Report: The Most Vulnerable Operating Systems and Applications in 2012
Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s …
13 for ’13 Jumpstart: Multifactor Authentication
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested 13 great IT projects for you to consider. We decided to publish some follow-up articles to …
13 for ’13 Jumpstart: User Provisioning
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we recommended 13 great IT projects for you to consider, since many IT departments start lining up their …
13 for ’13 Jumpstart: BYOD and MDM
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested thirteen great IT projects for you to consider, since as the New Year approaches, many IT …
Windows PowerShell: Essential Admin Scripts (Part 2)
In Part 1 of this two-part series, I covered the ‘Microsoft Troubleshooting Packs’ and ACL permission checks using PowerShell scripting. This article will focus on two more scripts, one to check if a host is alive and, if it is …









