Beware the Malware Banner

Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place their focus in online banking fraud. Online banking fraud is a serious affair judging by […]

Continue reading

Tips for a Good Patch Management Strategy

Previously “Never touch a running system” was a very common tradition/saying in IT administration. Once software is installed on a system, it will be never touched again as long as software does the job properly. Nowadays, this common tradition has changed. Updating software does not only bring new features into the product, it may also […]

Continue reading

How to Detect Network Intruders (Part 2)

In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client machine that is part of a corporate network. There are many ways in which malicious code can […]

Continue reading

How to Detect Network Intruders (Part 1)

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your corporate network from unwelcome visitors? It is well known that the internet is not the […]

Continue reading

How End Point Security Software Can Prevent Data Theft

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT infrastructure. Recent incidents such as Wikileaks are a very good example of why data theft […]

Continue reading

4 Reasons for Implementing Patch Management Software

Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain hot fixes which safely close security vulnerabilities in software. It is highly recommended to install […]

Continue reading

How Events Monitoring can Prevent IT Disasters (Part 3)

In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management system and a fax server) installed on one main server. These applications are very common […]

Continue reading

How Events Monitoring can Prevent IT Disasters (Part 2)

In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of pre-processing events represents the most important part of events monitoring, because this process will decide […]

Continue reading

How Events Monitoring can Prevent IT Disasters (Part 1)

An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be recoverable. In general IT disasters leave their marks on businesses which people remember and learn […]

Continue reading

Why FAX is still an essential element in corporate environments

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great thing is that fax reports in general have been acknowledged by some major courts in […]

Continue reading