All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.


Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.


Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?


Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?


Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?


Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments


Security back at the top of the exec agenda

Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.


A smart approach to IP-based video surveillance

The trend towards converged security requires companies to keep their eye on physical premises. Here's how to specify and deploy an IP-based video surveillance solution for your small business clients.

SecurityThe Business

Getting ISO27001 Certification

The requirement for information security certification is spreading from large organisations to small ones. What’s involved, and do you need it?


Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010



tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, has a pathping tool.
read more


Unified communications


The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources