Latest posts

Could your business survive a day without IT?

The chances are that your company could survive a single day without IT, but you can be sure that subsequent down days would prove fraught and stressful. So, make the plans now, before a real life event proves how important it is!

Continue reading

Sharing and storing data? File this away

How are telecommuters sharing the files, folders and communications generated in the course of collaborating? And what measures are taken to protect privacy, ensure safety and meet compliance? The answers matter.

Continue reading

Organized cybercrime: bad guys go pro, highlighting “customer service”

This increasing “professionalization” of the cybercrime industry is troubling for many reasons. Security expert, Deb Shinder looks into this.

Continue reading

UPDATE: Patch problems galore – and a community-provided fix

Microsoft update causes problems for users affecting Outlook archived mailboxes and some experiencing blue screens. Community provided fix available.

Continue reading

Top 10 free tools for network monitoring and analysis [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

You’ve got (malicious) mail

Unfortunately, email-based malware has gotten much more malevolent over time. And security pros should not see email as “old hat” or an outdated form of attack. Deb Shinder explains why.

Continue reading

August Patch Tuesday roundup

Nine security bulletins were released in August, addressing 37 vulnerabilities, most of them in Windows and a few in server products.

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

Microsoft bumps up security on IE after it earns title of “most exploited browser”

Microsoft is adding a new security feature to Internet Explorer. It’s called Out-of-date ActiveX Control Blocking.

Continue reading

Five great ways to stay in control of a mobile workforce

With mobile working widely expected to continue gaining in popularity, IT departments need to know how to maintain control and security of IT infrastructure. Here are five tips on how to do that.

Continue reading