How many email messages do you send each day? How many do you receive? Like many regular users, you probably send over 30 messages per day and receive over 100. If you are a power user, you can probably double those numbers and still come up short. With so much mail flowing through your inbox, it is far too easy to find your inbox full, to suffer from information overload, or even to get a little delete-happy and drop messages that you may need later on. Whether you are limited by the size of your mailbox, or the storage on your solid-state drive, there is a very good chance at some point you or your employees are going to find the need for an email message that was deleted. Continue reading →
Email is by far the number one way networks are compromised and the main route for data leakage. Fortunately there are some simple ways to safeguard this vital asset and the resources your email connects to.
1. Proper passwords
Too many email accounts are protected by passwords weaker than a Tour de France racer’s bicep. Simple passwords are simple to remember – so left to their own devices, that is what end users tend to choose. Continue reading →
Turn back the clock to late last year. At the height of the holiday season, between November 27 and December 15, hackers certainly gave new meaning to the term “hit the bull’s-eye!”
Cybercriminals toyed with retail giant Target, known for the circular red and white logo that symbolizes its name. Information from 40 million guest debit and credit card accounts was stolen – or so it was thought. The initial estimate, already among the largest in U.S. corporate history, turned out to be a fraction of the total. Today, it ranges from 70 million to 110 million, depending on reports. Continue reading →
When you started out in IT, did you really want to spend all your life applying patches to PCs and checking if the antivirus product installed is up to date and working properly? Let’s be honest, these tasks get a little repetitive and monotonous, but if you drop the ball with either of these jobs, your IT department (and you) could end up in hot water. Taking shortcuts on patching and antivirus should never be an option. Continue reading →
Mobile devices have become an integral part of life and business. More than 58 percent of Americans own a smartphone and 42 percent own a tablet, reports Pew Research. Learn how to use your smartphone and tablet to run your business while out of the office. Become more mobile, get in font of your customers, and be productive with these mobile devices technologies. Continue reading →
This article lists 10 of the best free tools for managing, comparing, administering and developing databases. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two on this list. Continue reading →
This article explains the two different versions of GFI EventsManager, and how it is licensed. Unfortunately GFI doesn’t break them down on its website, and thus creates some confusion to potential customers.
Formerly GFI EventsManager for Servers, GFI recently added an active monitoring component to the software. This is similar to GFI Network Monitor and adds the ability to monitor services, CPU utilization, hard drive space and more. This version also allows to you to manage event logs from Windows Servers, W3C logs and Sys logs from network devices such as Cisco routers and switchers. You are not able to manage logs from computers running Microsoft Windows (workstations) this product is licensed per node. Continue reading →
At your favorite restaurant, a tablet greets you and takes your order instead of a waitress. While shopping, your smartphone sends you an instant notification that the product you want is on sale. Instead of being locked in your cubicle, you are reviewing the spreadsheet your boss sent you on your smartphone at the top of a ski hill. These are just a few of the shifts mobiles will make to the business world in 2014. Continue reading →
The Windows logging system was never designed for ease of use. Depending on the audit settings, the information that is logged is rich and can meet the needs of any forensic investigation, but at the same time is cryptic and insufficiently documented. Events are logged in high volumes and support for managing these records is limited within the operating systems themselves.
This is why simple pain points, such as monitoring access to computers or resources, are difficult tasks for Windows admins, but, at the same time, are critical to comply with security best practices, industry standards, legal requirements and to ensure the health of the IT infrastructure. This article is not a deep-dive into the Windows logging system, however, I will provide information that can help admins build structure and consistency when it comes to monitoring access to Windows computers and resources. Continue reading →
So much can potentially go wrong on even the smallest of IT infrastructures. So it’s crucial that IT admins have up-to-the-minute information on the laptops, PCs and servers they are responsible for. Continue reading →