• Security

    PDF Security: obfuscated code, hackers and other threats

    Hackers are finding increasingly inventive ways of exploiting holes in Acrobat. The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.
    read more
  • Security

    Specifying and supporting disk encryption

    Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?
    read more
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
ServerSecurityTelecoms

Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
SecurityNetworkClient

Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?

   
ServerSecurityNetwork

Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments

   
Security

Security back at the top of the exec agenda

Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

   
Security

A smart approach to IP-based video surveillance

The trend towards converged security requires companies to keep their eye on physical premises. Here's how to specify and deploy an IP-based video surveillance solution for your small business clients.

   
SecurityThe Business

Getting ISO27001 Certification

The requirement for information security certification is spreading from large organisations to small ones. What’s involved, and do you need it?

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

You want the PCs you support to have the right time for more reasons than keeping the users happy; for one thing, if every PC has a slightly different time, finding which version of a file was updated most recently gets much more complicated. Get your head around the Windows Time Service at http://technet.microsoft.com/en-us/library/cc773013.aspx, get the commands for making a PC get its time from the domain at http://technet.microsoft.com/en-us/library/cc758905.aspx and if you want a an alternative time server use uk.pool.ntp.org to get the time from a random time server in the NTP Pool Project (read about the project at http://www.pool.ntp.org/use.html) read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS