• Security

    Dealing with a Data Breach

    It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
    read more
  • Security

    Setting up false volumes in TrueCrypt

    TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.
    read more
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
ServerSecurityTelecoms

Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
SecurityNetworkClient

Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?

   
ServerSecurityNetwork

Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments

   
Security

Security back at the top of the exec agenda

Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

   
Security

A smart approach to IP-based video surveillance

The trend towards converged security requires companies to keep their eye on physical premises. Here's how to specify and deploy an IP-based video surveillance solution for your small business clients.

   
SecurityThe Business

Getting ISO27001 Certification

The requirement for information security certification is spreading from large organisations to small ones. What’s involved, and do you need it?

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

You don't have to go to the conference to see the vmworld sessions; many of them are available free on the Web. Virtualising Exchange (http://www.vmworld.com/vmworld/static/sessions/2008/europe/AP03.html) and VMware Site Recovery manager (http://www.vmworld.com/vmworld/static/sessions/2008/europe/BC01.html) are well worth a look. The Expert Sessions at http://www.vmworld.com/vmworld/community/experts?src=NEWS_08Q3_VMW_OTHER_VMWORLDCOMNEWS_EXPERTS cover third-party tools for VMware.
http://www.vmworld.com/vmworld/sessions_2007.jspa read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS