At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.
Continue readingAt its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.
Continue readingWith over 1 billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. In some cases, mobile phones pose a greater security risk than a desktop computer.
Continue readingEmployee Internet monitoring is a discovery tool that enables the IT admin to properly manage and secure the network from the bad guys.
Continue readingLaptops are a great target for malicious attackers and some really sophisticated methods are being used. Business laptops should be properly secured and that they are checked for vulnerabilities and missing patches regularly.
Continue readingMicrosoft Forefront will be discontinued. Instead, Microsoft has launched a new product line called Exchange Online Protection. Can existing Microsoft Forefront Protection customers simply migrate to the new Exchange Online Protection solution?
Continue readingVulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?
Continue readingWindows Firewall Error Code 0x80070424 may indicate a problem with the Windows Module Installer. Here’s how to fix it.
Continue readingWe’ve collected a list of the skills that are most important to sysadmins, no matter what their specific focus is – check it out!
Continue readingWhether you are trying to make a backup for a departing employee, to respond to a discovery motion or a compliance request, or you are trying to import data into a test environment, you may from time to time need to either import data from a PST into a mailbox or export a mailbox to […]
Continue readingWhen we talk about vulnerability assessments, we most like think of operating systems, applications, laptops, workstations and servers, yet network devices are often overlooked. And that could become a problem. That is why it’s important to have a tool which scans your network and does a full vulnerability assessment of all your software and hardware. […]
Continue reading