Why you need a dedicated analyst or officer to monitor your adherence.
There may be something online you want to restrict access to. What do you do to block access to Internet applications and other things online? You can block ports to block access, and this article explains the details of how to block ports.
You are looking for a free encryption solution. The two choices that you’ve narrowed it down to are Free OTFE and TrueCrypt. Read on for a comparison to help you decide which one to use.
Can Free OTFE take on the big guys in encryption software? Read on to find out.
Green Computing and Cloud Computing are each some of the cutting edge IT topics today. But how can they work together? This article examines how Cloud Computing can help your company in its goal for Green IT. And a Green IT initiative may be a reason to use Cloud Computing.
Remote Desktop services and Terminal Services provide administrators with the means to serve more users with less hardware. Remote Desktop sessions pose specific problems for monitoring, logging, and recording user activity. SoftActivity TS Monitor may help you solve these problems.
In Part 1, we discussed the need for building a regular expression to help us filter spam. I showed how to install and build a regular expression using Regulazy. In this article, we’ll cover testing the regular expression as well as how to add a regular expression to a spam filter.
Having a security policy and knowing how you want your systems secured are important, but to ensure this plan is in place, security settings should be audited. Here we focus on Windows system security settings but several of these items are relevant on any operating system. Here are the top 5.
Email archiving is a lot like going to the dentist –if you’ve never done it before, it’s something you know you should do, but if you can, you’ll put it off as long as possible. Implementing an archiving solution really isn’t as bad as you think. Here are some things you need to know.
Any company can be at risk for being sued in a civil case and with today’s advanced use of computers and networks, rounding up relevant evidence to support the case will likely be necessary. The process of finding, preserving and presenting electronically stored information is called e-Discovery.