• Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
  • Security

    Security back at the top of the exec agenda

    Security back at the top of the exec agenda In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.
    read more
SecurityTelecoms

Supporting mobile email on multiple handsets

Everyone wants mobile email - but not every mobile phone is suitable for business email. Use these tips and tools to secure Exchange servers and make them work with more than Windows Mobile handsets.

   
ServerSecurityBusiness Continuity

Backing up: save the data, save the day

All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?

   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   
SecurityBusiness Continuity

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
Security

Encrypting backup tapes

Backup should be keeping your customer’s data secure as well as safe. Forget to encrypt data written to tapes and they run the risk of having to explain it to the auditor when a courier loses them.

   
Security

Installing Utimaco SafeGuard Easy

Protect a range of different versions of Windows with whole disk encryption with Utimaco SafeGuard Easy.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS