Using Microsoft Outlook to Access Other Users’ Mailboxes

Posted 2,076 CommentsPosted in Desktop Software, Email, Internet, Policies, System Administration

If you have a Microsoft Exchange server at your business, Microsoft Outlook has the ability to access more than one mailbox at a time. This is a useful feature if multiple users need to share access to the same email address, or if someone needs to cover another person’s email (when an auto-responder won’t suffice) […]

What is “Unified Threat Management?”

Posted 821 CommentsPosted in Business, Email, Internet, Security, System Administration

“Unified Threat Management” is a buzzphrase (that is, a few buzzwords strung together) heard a lot in networking and network security. Essentially, this is something (usually a device) which combines several network security services, including email filtering, web content filtering, firewalling, intrusion detection/prevention, and others. A UTM device can provide other services as well, such […]

Zeus Botnet Self-Destructs

Posted 8 CommentsPosted in Internet, Security

Last week, I posted an article explaining why security is everyone’s concern. Today I came across another article which underscores this. The Zeus botnet apparently self-destructed last month, effectively rendering 100,000 computers across the Internet non-functional.

We Don’t Have Anything Anyone Else Would Want

Posted 4 CommentsPosted in Internet, Security

When I first mention information security to a client, particularly a small business, non-profit, or educational institution, I frequently get a response like this: “Nobody is interested in our network.” “We don’t have anything that anyone would want.” “Our systems aren’t that important.” “No one would steal my account/password/login.” “Why would someone want to hack […]