Latest posts

Page 61

The Top 20 Free File Management Tools for Sys Admins

Here are 20 of the best free tools for file comparison, archiving, encryption, renaming, de-duplication, merging, copying, syncing and search. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two amongst […]

Continue reading

SysAdmin Day: We’re Taking it to Another Level!

In case it wasn’t clear enough last year, we love sys admins and SysAdmin Day is very important to us. So we decided to turn SysAdmin Day into SysAdmin Week – because one day is really not enough! Throughout this week, we’ll be publishing a daily post designed specifically for you – from free tools, to […]

Continue reading

The Endpoint Is a Moving Target

Once upon a time, when we talked about securing our networks from edge to endpoint, both ends of that route were pretty easy to define. Now not only has the perimeter blurred and blended so that it’s hard to determine where the local network begins, but the endpoint, too, has changed in nature. It’s no […]

Continue reading

When Good Devices Go Bad

Unless you’ve been sleeping under a rock for the past month or so, you must have heard about the National Security Agency (NSA) contractor that allegedly leaked data from the NSA regarding surveillance programs being conducted by the agency. Edward Snowden may be considered by some to be a hero, others to be a traitor, […]

Continue reading

July Webcast Line-Up

Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!

Continue reading

How to Avoid Becoming the Villain (Part 2)

Life is full of surprises. I recently wrote an article titled How to Avoid Becoming the Villain on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days ago, I came across a case that adds weight to the points I made then.

Continue reading

Faxing In The Healthcare Industry – HIPAA Compliance

  The security provision of HIPAA demands that healthcare providers take reasonable care to protect the confidentiality of protected healthcare information (also known as PHI). Traditional fax machines don’t qualify, making network fax servers the only way to safely and securely transmit confidential patient data. And that isn’t the only advantage of using a fax […]

Continue reading

acmeo Systemhaus Rally 2013 Recap

The acmeo Systemhaus Rally 2013 ended on a high last week as the teams gathered for an awards ceremony in Helsinki to find out who would be crowned winner of the first ever acmeo rally!

Continue reading

Computing Security Awards 2013 Nominations Now Open!

The nominations for the 2013 Computing Security Awards are now open!

Continue reading

Education is Your Only Defence against Shoulder Surfing

All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most of us and shoulder surfing can be either accidental – you  happen to be next […]

Continue reading