Features

Why it’s time to get physical with your computer

Why it’s time to get physical with your computer

Nick Barron Nov 12 2004 4:55PM Security
Email: Are we all too reliant on our new best friend?

Email: Are we all too reliant on our new best friend?

Robert Schifreen Nov 12 2004 4:55PM Security
Privacy laws will work when they are enforced

Privacy laws will work when they are enforced

Illena Armstrong Nov 12 2004 4:53PM Security
Do paper qualifications really prove anything?

Do paper qualifications really prove anything?

Ron Condon Nov 12 2004 4:52PM Security
Review: Firefox

Review: Firefox

So the browser wars are over and Internet Explorer won?

René Millman Nov 12 2004 12:00AM Security
The trouble with your double

The trouble with your double

It is estimated that identity theft accounts for nearly 40 per cent of all white collar crime in the UK. How can you protect yourself and your business from falling victim to this growing problem?
Geoff Webster Nov 10 2004 10:59AM Security
Gone phishing

Gone phishing

Despite the dangers of phishing becoming increasingly predominant in the news, a new generation of phishing frauds are steadily wreaking havoc on businesses.
Mark Murtagh Nov 9 2004 7:40PM Security
The new face of spamming

The new face of spamming

Spam - unsolicited email - is driving IT departments crazy. It wastes network and storage resources, steals time from staff and diverts IT resources to managing defences and poring over quarantine lists.
Pete Simpson Nov 9 2004 7:26PM Security
Review: Backup for Workgroups

Review: Backup for Workgroups

Backup for Workgroups is an unpretentious name for what turns out to be an uncomplicated product. Not much about this product is very clever, but that works to its advantage. Its lack of sophistication makes it a must-have for the workgroups it mentions, and for many more small business networks who might miss the point.

Eric Doyle Nov 8 2004 12:00AM Security
Review: NFR Sentivist IPS

Review: NFR Sentivist IPS

With new applications such as VoIP appearing on networks run by engineers with limited time and resources to make them secure, intrusion prevention technology is rising to the challenge. One answer, the brand new NFR Sentivist IPS, is raising the bar in the intrusion prevention system (IPS) category. The NFR Sentivist IPS is available as an appliance.

Keith Pasley Nov 8 2004 12:00AM Security
Fight off the zero-day exploiters

Fight off the zero-day exploiters

Abhay Joshi explains how having the right safeguards in place will minimize the damage to your enterprise
Abhay Joshi Nov 4 2004 3:07PM Security
Russian implicated as Sobig virus writer

Russian implicated as Sobig virus writer

The author of the Sobig virus has allegedly been unmasked. An anonymous document placed on the internet links it to a Russian named Ibragimov. The document indicates the Russian, or perhaps an associate from his company Send-Safe, is behind the virus.
David Quainton Nov 4 2004 11:53AM Security
Spyware and the law

Spyware and the law

I spy with my little eye, a legal problem beginning with "S".
Staff Writers Nov 2 2004 6:12PM Security
The reputation gamble

The reputation gamble

"It takes 20 years to build a reputation and five minutes to lose it," said Warren Buffett in 1930.The good reputation of a company or a brand is now seen as an essential element on the corporate balance sheet. It is a fragile asset that can be lost forever, unless all levels of the business safeguard it.
Dave Martin Nov 2 2004 4:25PM Security
Securing removable media

Securing removable media

Removable media devices are here to stay. Their ease of use and low cost have made them ubiquitous in the work environment – but at what price? In this article we look at the pro’s and con’s of removable media, and the steps IT managers can take to mitigate the security risks associated with them.
Magnus Ahlberg Nov 2 2004 4:25PM Security
California law hits firms nationwide

California law hits firms nationwide

Firms used to like handling security breaches quietly but that is no longer an option
Marcia Savage Oct 29 2004 5:04PM Security
Review: Windows Forensics and Incident Recovery

Review: Windows Forensics and Incident Recovery

Every attack on a computer system leaves a trace behind, no matter what an attacker might to to cover their steps. Also, data can be hidden by an attacker to use later as a back door. Forensics in part looks at uncovering evidence of this activity.

René Millman Oct 28 2004 12:00AM Security
Multi-layer dual firewall topologies

Multi-layer dual firewall topologies

The use of a multi-layer dual firewall topology is relatively new in network security, but it is rapidly gaining in popularity.
Paul A. Oct 27 2004 3:27PM Security
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
Back-up or pack-up?

Back-up or pack-up?

Data is the lifeblood of the organisation and any incidents, which stop access or result in a loss of critical data can have serious consequences for the business in terms of day-to-day operations and financial loss. This emphasises the ongoing need for back-up and recovery processes to be in place to minimise the effects of unplanned downtime and ensure the continuity of business processes. Paul Butler, principal consultant at Altiris, warns of the implications of not having sufficient processes in place to deal with the loss of business critical systems and data.
Paul Butler Oct 27 2004 3:27PM Security

Log In

  |  Forgot your password?