Many businesses are moving to cloud-based services, especially for email. Here are some of the mistakes we’ve seen, and how you can avoid them.
Today, Astaro (a division of Sophos) released version 8.2 of their Astaro Security Gateway.
In case you missed a previous post or two on the topic of why end users should not have administrative rights over their PCs, BeyondTrust has released a very compelling report on this issue.
Last week, I received this in an email from Google: In order to continue to improve our products and deliver more sophisticated features and performance… we will be phasing out support for Microsoft Internet Explorer 6.0 as well as other older browsers that are not supported by their own manufacturers. It’s about time, and not […]
This week’s Data Security Podcast had two items that really piqued my interest. The first was an article about an Ohio hospital which suffered data loss due to a malware infection. The malware was sent by the boyfriend of a hospital worker. Apparently he intended to follow his girlfriend’s movements on the Internet on her […]
The Astaro Security Gateway is a product we have been using for a few years with various clients as a UTM (Unified Threat Management) device. It offers a number of features that they require, including network security, email security, and web surfing security.
Readers of my personal blog or listeners to the Fresh Ubuntu Podcast will know that I have long been a proponent of Linux as an alternative to Windows, and now, more than ever, this should be a reality at your organization. What’s changed? Last year, Ubuntu, the leading desktop Linux distribution today, addded a package […]
Today I am reviewing a tiny, free, handy piece of software for end-users: Rubber Ducky System Monitor by MimarSinan International. The program is a tiny application which gives even a novice user a simple, easy to read display which tells them how busy their system is and identify potential problems.
We sometimes get support requests from frustrated clients who are in some way prevented from accomplishing a task because of system security policies. Unfortunately, they sometimes think that we have done this deliberately to make their job difficult. One of my jobs as a security professional is to explain to my clients just what security […]
Symantec Ghost is a useful application for what’s known as “imaging” or “cloning” computers. It allows you to copy a single computer’s hard drive contents to multiple machines at once so you have a base Windows install that’s exactly the same on all of the machines. The only difference is the uniquely identifying information about […]