USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.
Cold mornings and the clocks going back are going to put up heating and lighting bills for businesses as winter draws in, but increasingly IT is putting up the electricity bill too. Power prices have increased significantly this year and it’s not yet clear whether they have peaked. Offer customers a power audit that covers printing, servers, desktop PCs, storage and peripherals or include it when you’re planning a new deployment to sweeten the deal — and try it out in your own office to find out how much you can save by managing IT power.
Most people share the same idea of Office Hell. A plain, bland and featureless big room, with open desks that give no privacy or peace. At best, a maze of little cubicles with walls no higher than five feet eight, no door and no ceilings.
Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.
If your best client were to lose their mail server and the emails on it, how crippling would that be? Most businesses both large and small depend on email. If a company relies on email, you need to have the tools and techniques ready to solve their problems for the day disaster strikes.
Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010