• Security

    Protecting Networks

    Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?
    read more
  • Security

    Centralising anti-virus protection for business

    Disinfectant for the desktop, with less swabbing. Many small businesses’ anti-virus software strategies are a mess: here’s how you look after it for them, with minimal fuss.
    read more
SecurityNetwork

Secure Remote Access with SSL VPNs

What to look for when choosing an SSL VPN appliance for small business customers
Secure sockets layer (SSL) virtual private network (VPN) software has been around for a long time, but it is only relatively recently that is has been delivered on dedicated hardware appliances that specialise in hosting remote access, with many of those devices aimed squarely at the SMB market.

   
SecurityClient

Offering Consultancy on Email Compliance Issues

If you ask your customers what they know about legislation involving data, the chances are you’ll be horrified by the answers.

   
Security

Setting up a VPN between two sites

Setting up a VPN between two sites for a small business to create a single network; although the interface will be different for every router, the functions are roughly the same.

   
SecurityNetwork

Configuring routers correctly

Your client needs a router to connect them to the Internet – but unless it is configured correctly, it could represent a significant security loophole.

   
ServerSecurityTelecoms

Mobile email with Linux email servers

Not every business runs Microsoft Exchange. Maybe the company isn’t based around a Microsoft infrastructure or Exchange is too expensive or they use something else for historical reasons.
   
ServerSecurityClient

Centralising anti-virus protection for business

Disinfectant for the desktop, with less swabbing. Many small businesses’ anti-virus software strategies are a mess: here’s how you look after it for them, with minimal fuss.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
SecurityClient

Deploying and supporting XP SP3: use our expert tips to resolve incompatibility and installation issues

The third service pack (SP3) for Windows XP was released in May this year and while it’s a relatively stable and straightforward cumulative upgrade, there are some minor installation issues that you’ll want to be aware of before you roll it out — and if SP3 is already there, they might already be generating support calls.

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
Security

Controlling anti-social networking – a guide to blocking employees access to Facebook, MySpace and more.

Right now, your customers’ employees are looking at Facebook and surfing MySpace. If that doesn’t worry their employers, it should.

Social networking has only gained popularity in the last three or four years, but it is generating the same concerns that instant messaging did at the start of the decade.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS