Latest posts

Page 4

Have wireless, will travel

In this article, we’ll take a look at some of the technological innovations that are making travel a little more pleasant.

Continue reading

Why corporate security is needed beyond corporate walls

Laptops are a great target for malicious attackers and some really sophisticated methods are being used. Business laptops should be properly secured and that they are checked for vulnerabilities and missing patches regularly.

Continue reading

November 2014 – Microsoft Patch Tuesday

Microsoft threw us a bit of a curve, releasing “only” 14 of the patches, with two – MS14-068 and MS14-075 – deferred with the label “Release date to be determined”.

Continue reading

Antivirus is not a replacement for patch management software

While antivirus software is absolutely critical and has its proper place in your network, it’s no substitute for patch management software. Using both will help to bolster your defenses and is a good start towards that layered security approach.

Continue reading

The 21 secrets of email signature bliss

Doing email signatures the right way can be a challenge for many companies, so here are some tips to help you with email signature etiquette and effectiveness.

Continue reading

Microsoft’s monster update might mean it’s time to rethink your patching strategy

Microsoft is releasing sixteen security bulletins that will address numerous vulnerabilities – but of course that’s only the tip of the patching iceberg.

Continue reading

November Advance Notification: A plethora of patches on the way

November brings us a total of 16 patches from Microsoft. The somewhat good news is that only five of them are rated as critical, with four of those being remote code execution vulnerabilities and the fifth addressing an elevation of privilege issue.

Continue reading

Seven reasons why online faxing is good for healthcare providers

Online faxing is growing in popularity among healthcare providers as more and more doctors’ offices, hospitals and labs start to see just how easy it is to integrate, and how much time, effort and money it saves them.

Continue reading

Security 101 – Encryption terminology

One of the first things that comes to mind when talking about security is encryption. Encryption can be used to provide confidentiality and integrity, which are two of the three main tenets behind security. To be sure that you are familiar with the concepts we will be covering in upcoming articles, here is a primer on encryption terminology.

Continue reading

IT Confidential: A Day in the Life

As cloud computing slowly but persistently permeates all of IT, what will a day in the life of the IT pro of tomorrow be like?

Continue reading