What is Layered Security?
The term layered security is probably not something you hear very often, but chances are it is something you are familiar with. Check this out to find …
Continue ReadingThe term layered security is probably not something you hear very often, but chances are it is something you are familiar with. Check this out to find …
Continue ReadingCreating a VLAN (Virtual Local Area Network) can help to increase security on your network. Many Network Administrators create VLANs to hold down …
Continue ReadingMany administrators today overlook a threat that is very real. Rogue access points (APs) are access points brought from employee or student homes …
Continue ReadingIt is recommended to have anti-virus, anti-malware or anti-spyware, firewall software to all machines that we are using. Today, I want to recommend …
Continue ReadingThe Security Policies and Group Policies in major Microsoft operating systems allow for the control and tightening of security. With Windows XP …
Continue ReadingMicrosoft’s Vista is one of the most secure operating systems produced by Microsoft. Security with any operating system is set to defaults to …
Continue ReadingCareful attention to the DNS software version used and secure configuration of DNS devices by companies will considerable minimize the risk of DNS …
Continue ReadingMost of us using MSN or Yahoo messenger very day without knowing that all the conversations will be recorded and usually the data has been used for …
Continue ReadingWhat are authentication methods? In order to protect the assets on your network, authentication methods you use is the number one defense you can …
Continue ReadingBecause of the proliferation of networked servers, workstations, and other computer devices, the threats to stored information have increased greatly. …
Continue ReadingFind out how to design a secure company network, including remote access and internal security.
Continue ReadingMicrosoft’s SQL Server is one of the most widely used databases in the world. With assets in the database, the individual tables are capable of …
Continue Reading