Heartbleed Bug – Are You Affected?
Are you affected by the Heartbleed Bug? The recent Heartbleed bug has been dubbed the biggest security threat the internet has seen. The vulnerability affected a huge number of popular and well-known...
View ArticleChoosing the Right Antivirus Software
While the internet is, at this point, a very polished entity, it’s not as safe and secure as it seems. Even the most tech-savvy user will likely take on some kind of malware or spyware at some point in...
View ArticleBitLocker and Windows Server 2008
When planning a BitLocker deployment in your Windows Infrastructure, you’ll need to take into consideration many factors that can/will influence your network. This technology was first released with...
View ArticleHow Secure is Dropbox?
More and more companies are looking to harness the cloud as a part of their business. For many this starts out with centralizing all files on a cloud based service. Of all these services, Dropbox is...
View ArticleDo You Need to Tighten Up Your Business Security?
The online world is one that has its dangers, so it’s a good idea to consider your business and its security on the internet. For every contemporary business the ability to safely email, work remotely,...
View ArticleDeploying Terminal Services
In this article we will discuss Terminal Services or Remote Desktop Services available with newer versions of Windows Server. I will describe the main components that make up this technology and we...
View ArticleHow to Remove Your Digital Footprint
The internet has been around for some time now and it’s likely that there’s plenty of information on there that many people would rather be deleted. Plenty of devices connect to the internet these days...
View ArticleGoogle Glass Etiquette
Wearable technology is moving away from the fringe, perhaps even from the ‘geeks’ and is now enjoying a more generalized reception. Google Glass is the tech giant’s offering and there are more and more...
View Article5 Business Alterations to Dropbox
With the world of media ever careering forward, powered by the continuously changing, improving and updating technological landscape, there is an ever-increasing need for companies to be able to...
View ArticleBig Data and the Law
Big Data is the term used to describe the commercial aggregation, mining, and analysis of very large, complex and unstructured datasets based on social media and Web-enabled workloads. Platforms like...
View ArticleShellshock vulnerability – worse than HeartBleed :(
Do you remember HeartBleed from a few months back? There’s another huge vulnerability that just came to light: Shellshock. And this one is much worse than HeartBleed Shellshock is based on a...
View ArticleConfigure Network Address Protection w/ DHCP Enforcement
In this article I will show you how to install and configure NAP with Dynamic Host Control Protocol (DHCP) enforcement. You may already be familiar with DHCP which is a service used to allocate network...
View ArticleBYOD Security Threats and How to Solve Them
Bring your own device, or BYOD, is becoming an increasing trend within large and small businesses alike. Allowing employees to use their own devices has its benefits. It has been seen to increase...
View ArticleAre Malware Threats Making Antivirus Software Obsolete?
Viruses, trojans, worms – malware (a contraction of ‘malicious software’) come in many forms. Even though these threats have been around for decades, the volume has increased steadily in line with...
View ArticleShortage Of Cyber Security Professionals
In October this year, at a Digital Skills Committee meeting that was hosted in the House of Lords in the UK, it was revealed that by 2017 there will be a global shortage of 2 million cyber security...
View ArticleThe Future of Cyber Security in The Home
The internet is an increasingly important part of our daily lives. When it was first evolving, security was less of a concern. With the growth of cyberspace have come new opportunities – and new...
View ArticleThe Top 3 Best Password Managers
There was once a time when all you needed to do was remember your email login password and you could be described as a top-notch password manager yourself. Not so anymore. With today’s business and...
View ArticleLinkedIn Feature: Monitoring in the Cloud Examined
It’s that time again for a brand new, in-depth 3 part article we post on LinkedIn! So, starting today (March 13th 2015), we are posting up a very special extended 3-part feature exclusively on...
View ArticleTop Priorities for IT in 2015
As organizations continue the trend of transforming physical processes and business models into digital ones, it’s worth having a look at those issues that will vex or focus the minds of IT divisions...
View ArticleHow to Install & Configure Remote Access Servers
VPN or Virtual Private Network has become one of the core components in large enterprises and as a System Administrator you will most certainly stumble upon this technology. There are multiple VPN...
View Article