Our top Ten Security and Management Reports
Beating the Insider Threat
Stand in any city station during rush hour and you are guaranteed that at least 80% of the people walking by will have some device capable of plugging into a PC and downloading data.
Collaboration and Communication - Is More Better?
In the good old days, if you wanted to communicate with someone, you met up with them and talked, or you sent round someone with a piece of paper, and that someone stayed there while the communicant responded in writing and brought the message to you.
A Streaming Headache for IT Bosses
The long summer of sport draws to a close, and corporate networks draw a breath of relief as multiple streams of video cease to take 90% of available bandwidth from the business.
Tame your Mobile Telephony/Data costs
The costs of mobile telephony and mobile data is often seen as a major concern for businesses when dealing with mobile operators, but if they look for alternative ways to address their needs, are they ready to deal with the increase in complexity that might bring?
Are you a windscreen or a fly?
The term "convergence" is often used in the technology industries, especially to refer to the move towards standard, open, Internet-based communications, which makes it all sound very positive. But the result is a collision of business models, not all of which will survive.
Are we (virtually) there yet?
Virtualisation is one of those words that seems so innocuous, but is more like the proverbial can of worms.
The Latest Keyboard Video Menace
Ben Chai examines traditional KVM devices and shows how housing them in your server rooms can actually cause major security problems.
Five Disturbing Myths about the Microsoft Encrypting File System
Think Microsoft EFS will secure your data? Think Again. Ben Chai examines myths surrounding Microsoft EFS and shows how easy it is to break the encryption and how to strengthen your usage of EFS.
Beating Viruses the Smart Way
Email. Love it or loathe it email is now synonymous with doing business and most people would feel hopelessly lost without it. Unfortunately we all know the downside of email as aside from irritating and sometimes offensive spam messages it can act as a conduit for malware.
Physical Security - Another potential threat to your enterprise
Ben Chai examines how the implementation of many corporate physical security solutions still pose a security risk and the potential solutions to this problem.