Skip to main content

Our top Ten Security and Management Reports

Our top Ten Security and Management Reports

Beating the Insider Threat

Stand in any city station during rush hour and you are guaranteed that at least 80% of the people walking by will have some device capable of plugging into a PC and downloading data.

Collaboration and Communication - Is More Better?

In the good old days, if you wanted to communicate with someone, you met up with them and talked, or you sent round someone with a piece of paper, and that someone stayed there while the communicant responded in writing and brought the message to you.

A Streaming Headache for IT Bosses

The long summer of sport draws to a close, and corporate networks draw a breath of relief as multiple streams of video cease to take 90% of available bandwidth from the business.

Tame your Mobile Telephony/Data costs

The costs of mobile telephony and mobile data is often seen as a major concern for businesses when dealing with mobile operators, but if they look for alternative ways to address their needs, are they ready to deal with the increase in complexity that might bring?

Are you a windscreen or a fly?

The term "convergence" is often used in the technology industries, especially to refer to the move towards standard, open, Internet-based communications, which makes it all sound very positive. But the result is a collision of business models, not all of which will survive.

Are we (virtually) there yet?

Virtualisation is one of those words that seems so innocuous, but is more like the proverbial can of worms.

The Latest Keyboard Video Menace

Ben Chai examines traditional KVM devices and shows how housing them in your server rooms can actually cause major security problems.

Five Disturbing Myths about the Microsoft Encrypting File System

Think Microsoft EFS will secure your data? Think Again. Ben Chai examines myths surrounding Microsoft EFS and shows how easy it is to break the encryption and how to strengthen your usage of EFS.

Beating Viruses the Smart Way

Email. Love it or loathe it email is now synonymous with doing business and most people would feel hopelessly lost without it. Unfortunately we all know the downside of email as aside from irritating and sometimes offensive spam messages it can act as a conduit for malware.

Physical Security - Another potential threat to your enterprise

Ben Chai examines how the implementation of many corporate physical security solutions still pose a security risk and the potential solutions to this problem.

Désiré Athow

Désiré has been musing and writing about technology during a career spanning four decades. He dabbled in website building and web hosting when DHTML and frames were en vogue and started writing about the impact of technology on society just before the start of the Y2K hysteria at the turn of the last millennium. Following an eight-year stint at where he discovered the joys of global tech-fests, Désiré now heads up TechRadar Pro. Previously he was a freelance technology journalist at Incisive Media, Breakthrough Publishing and Vnunet, and Business Magazine. He also launched and hosted the first Tech Radio Show on Radio Plus.