dcsimg

Articles by Beth Cohen 

Cyber Intrusion

Cyber intrusion can be very costly in terms of lost productivity, but small businesses are particularly vulnerable because they have fewer resources to devote to preventive measures. We look at the real costs of cyber intrusion.

Computer Maintenance Essentials

There are some fairly simple tasks that if done on a regular basis, can save your company when a computer disaster strikes. Implementing these simple guidelines will not prevent a disaster from happening, but it will allow you to get back to business faster and with fewer tribulations.

RADIUS: Secure Authentication Services at Your Service

RADIUS ensures that remote users are who they say they are, keeps track of their network usage, and secures your network infrastructure from intrusion. Learn how deploying RADIUS in-house or as a managed service can benefit you and your company's network.

Searching for Wi-Fi Security Solutions

Security has long been the Achilles heel of the wireless industry. Set aside the security issues, though, and the case for wireless networking is overwhelmingly compelling — it's cheap, easy, and portable. Now that the industry is addressing the problem head-on with new solutions for manageable and acceptable network security, Wi-Fi may well be a choice that enterprises should be considering (or reconsidering).

'Good Enough' Security: Network Security on a Shoestring Budget

Beth Cohen presents principles of 'good enough' computer security that might not prevent a massive targeted attack, but that will prevent 90% of your problems while keeping your finance department happy and your job secure.

Public Key Infrastructure: Invisibly Protecting Your Digital Assets

Public Key Infrastructure (PKI) offers the opportunity to streamline your procedures for protecting and sharing sensitive and valuable information. As Beth Cohen and Debbie Deutsch report, when it comes to protecting your company's valuable digital assets, you owe it to yourself to investigate what doors PKI can open for you and your organization.

'Good Enough' Security: Network Security on a Shoestring Budget

In an environment where most of us are continually squeezed for time, resources, and funds, how can we possibly hope to fix and prevent all of our network's security problems? Beth Cohen presents principles of 'good enough' computer security that might not prevent a massive targeted attack, but that will prevent 90% of your problems while keeping your finance department happy and your job secure.

DNSSEC: Security for Essential Network Services

DNS has been a major security hole since it was first deployed, but until recently, not much had been done to patch the network service's security vulnerabilities. Beth Cohen reveals the largest DNS security holes, explores how you can protect your network from them, and introduces the IETF's new DNSSEC standard designed to prevent potential future catastrophic attack.

Single Network Identity: Holy Grail or Nightmare?

Network managers are well familiar with the chaos multiple passwords and identities can cause with harried user communities. When is a single identity across the network more menace than refuge?

Network Security: Covering the Basics

Everyone loves a good security horror story when it's someone else's security that's horrifying. Sticking to some basics can ease your fears about your own network while others swap war stories. First in a series.