Latest posts

Page 58

Malware Headlines Make Case for Sandbox

With The New York Times recently reporting on the origins of Stuxnet and all the commentary and speculation on the incredibly sophisticated Flame malware, some interesting questions are being raised by my colleagues in the security industry and the journalists covering these threats. There are obviously some serious geopolitical and ethical considerations attached to the reported […]

Continue reading

Ten things administrators should never do

Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There are many efficiencies you can achieve without causing trouble; this is a list of things […]

Continue reading

The Hidden Threat behind Web Banners [VIDEO]

Advertising builds trust in a brand, and that trust makes us feel secure enough to click on a banner ad of a brand we know while browsing the Internet. However, danger could lurk here in the form of “malvertising”.

Continue reading

The Four Main Benefits of Automatic Patch Management

Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire network. That could all be a reality, as there is software available that can do […]

Continue reading

Nine Great Cloud Anti-Spam Blogs to Check Out

Are you a system admin or an IT junkie looking for the latest updates and tips in the cloud computing sphere? We have listed nine great blogs, each with its own focus on cloud computing, which make for some great reading and reference material, and we’re sure you will find information you won’t want to […]

Continue reading

The Web’s Top 5 Security Issues [VIDEO]

Can we ever feel safe when we are online? There are so many threats out there that being concerned is actually a good thing. But what threats should we be vigilant for? You can find the answer in this video that looks at the top five security issues we currently face on the web. Cybercriminals […]

Continue reading

Is Exchange Anti-Spam Enough?

We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different for every organization. Because this is a vague area, it can also give rise to […]

Continue reading

PCI DSS: Twelve IT requirements

The Payment Card Industry Data Security Standards — or PCI DSS — cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS’s 12 key requirements in this quick overview; together they make up the kind of IT security policy that any company would be wise to implement.

Continue reading

111 Windows Tips to Help You Put Nine Hours into an Eight-Hour Day

Is this you: Eat lunch at your desk because you don’t have time to go out? Can’t stop for five minutes to chat at the coffee machine? Wear your wireless headset into the restroom because conference calls and biological necessities conflict? Tired of always leaving work just five minutes too late to beat the afternoon […]

Continue reading

Take back Control of Your Bandwidth

It is a well known fact that IT Administrators are one of the least recognized and appreciated roles in a company. It is certainly true that people are quick to whine and fret when something is not working, but nobody calls to say “thanks” when everything is running smooth. One of the most common complaints […]

Continue reading