• Security

    Protecting Networks

    Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?
    read more
  • Security

    Centralising anti-virus protection for business

    Disinfectant for the desktop, with less swabbing. Many small businesses’ anti-virus software strategies are a mess: here’s how you look after it for them, with minimal fuss.
    read more
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
ServerSecurityTelecoms

Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
SecurityNetworkClient

Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?

   
ServerSecurityNetwork

Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments

   
Security

Security back at the top of the exec agenda

Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

   
Security

A smart approach to IP-based video surveillance

The trend towards converged security requires companies to keep their eye on physical premises. Here's how to specify and deploy an IP-based video surveillance solution for your small business clients.

   
SecurityThe Business

Getting ISO27001 Certification

The requirement for information security certification is spreading from large organisations to small ones. What’s involved, and do you need it?

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS