How event monitoring can prevent IT disasters

Knowing what’s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room! Using comprehensive system monitoring tools to filter, sort and display the millions of system events is […]

Continue reading

Email security solutions: On-premise vs. hosted

Email security is available both as an online service and as an on-premise solution — but which is a better fit for your business? Learn which delivery model is best for you through this quick video.

Continue reading

Ten things administrators should never do

Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There are many efficiencies you can achieve without causing trouble; this is a list of things […]

Continue reading

The Hidden Threat behind Web Banners [VIDEO]

Advertising builds trust in a brand, and that trust makes us feel secure enough to click on a banner ad of a brand we know while browsing the Internet. However, danger could lurk here in the form of “malvertising”.

Continue reading

The Four Main Benefits of Automatic Patch Management

Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire network. That could all be a reality, as there is software available that can do […]

Continue reading

PCI DSS: Twelve IT requirements

The Payment Card Industry Data Security Standards — or PCI DSS — cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS’s 12 key requirements in this quick overview; together they make up the kind of IT security policy that any company would be wise to implement.

Continue reading

HIPAA – IT compliance

HIPAA is the Health Insurance Portability and Accountability Act that regulates the creation and handling of personal healthcare information. If you create or handle personal healthcare information, that is data that can be tracked back to an individual, then you are very likely to be covered by the act. Here’s a quick look at HIPAA’s […]

Continue reading

Five essential tips to ensure corporate email compliance

The world of email compliance is a complicated one. Not only do you have to cope with an alphabet soup of acronyms describing regulatory bodies, you also have to decipher reams of compliance requirements for your industry. In an effort to ease that burden, we have put together this quick guide on how to help […]

Continue reading

The Top 5 Online Security Traps and how to Avoid Them

It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to share with your network users on five common online security traps.

Continue reading

The Perils of Public Wireless Networks

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This video sheds more light on those risks and shares some useful tips on how to […]

Continue reading