Latest posts

Page 61

Why Do Companies Fax?

In all my years of involvement with the fax server software industry, telephone systems, a plethora of industry sectors, and small to enterprise business in general, I cannot remember one person ever telling me they love to fax. So why do companies fax?  It’s not because they want to, but more because they have to.  […]

Continue reading

How to Dispose of Confidential Data

Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked – the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video.

Continue reading

Exchange Server 2010 Scalability Techniques

As your organization grows, so do mailboxes and, with them, storage requirements. You will therefore need to make some scalability tweaks and design considerations in accordance with this growth. In this post I shall outline the best Exchange Server 2010 scalability methods any Exchange admin should consider.

Continue reading

Danish Police Incident Calls for a Security Assessment

A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not even be familiar with Security practices. These situations can cause a lot of problems and […]

Continue reading

10 Free Tools for Network Administrators

Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video’s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size business) administrator!

Continue reading

March Webinar: Add Value to Your MSP with Cloud Services

Coming to “the end” of your time as a Managed Services Provider (MSP)? Looking for a way to “break on through” your business doldrums by adding cloud services? Then register for this month’s informative webinar and learn a bit more how cloud-based services can help your business thrive. Webinar: Riders on the Storm: Adding Value […]

Continue reading

Scanning Open Ports in Windows: A Quick Guide

When troubleshooting client or server side application network connectivity issues, it is often necessary to determine if access to a certain port that the application uses is being blocked. In this article we’ll take a quick look at how to view open ports using a number of lightweight freeware tools for Microsoft Windows. You might […]

Continue reading

Are you being sniffed?

Packet sniffing is the hacker’s technology of choice to probe networks. In this video, we explain how you can be watched or ‘sniffed’ and, more importantly, how to protect your network against this security threat.

Continue reading

Security Patching Trends for Major Software Vendors

An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch release cycles have changed over the last few years. The big players in software industry […]

Continue reading

5 Security Mistakes SMBs Make and Their Simple Solutions

What are the top five security errors that small and medium-size businesses (SMBs) commonly make? And how can you avoid them? Watch this video for some simple but solid advice and practical tips to increase your organization’s network security.

Continue reading