dcsimg

Paul Rubens - Article Archives - Page 5

4 Tips for Cloud Compliance

June 12, 2013
Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
READ MORE

BYOD Fuels NAC Comeback

April 11, 2013
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
READ MORE

6 Emerging Security Threats, and How to Fight Them

March 25, 2013
Hackers are nothing if not creative, so it's important for enterprise security pros to educate themselves about emerging security threats like these six.
READ MORE

Anti-Virus Isn't Enough: 7 Steps to Discourage Hackers

March 6, 2013
Anti-virus software is no longer a match for today's threats. Here's what your business needs to stay protected.
READ MORE

Cloud Becoming Key Element of Enterprise Security Strategies

February 25, 2013
While cloud security technology hasn't eliminated cybercrime, it has given organizations some new and effective ways of fighting it.
READ MORE

Virtualization Poses Security Risks in Public Cloud

February 19, 2013
Companies moving applications to a public cloud need to be aware of the risks created by using virtual machines in a shared cloud infrastructure.
READ MORE

How to Prevent Spear Phishing Attacks

November 26, 2012
While security software can help prevent spear phishing attacks, staff training is the best way to avoid phishing losses.
READ MORE

How to Prevent Security Breaches from Known Vulnerabilities

November 2, 2012
While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks.
READ MORE

Review: Malwarebytes Enterprise Edition

October 24, 2012
Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.
READ MORE

7 IPv6 Security Risks

October 18, 2012
Not many people consider security risks associated with IPv6, the newest version of the Internet Protocol. But maybe they should.
READ MORE

Review: Microsoft System Center 2012 Endpoint Protection

September 25, 2012
While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.
READ MORE

Review: McAfee Deep Defender

August 23, 2012
Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.
READ MORE

Biometric Authentication: How It Works

August 17, 2012
Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.
READ MORE

Review: Total Defense Anti-Virus r12

August 13, 2012
CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.
READ MORE

Five Signs Your Website is the Target of an Automated Attack

August 10, 2012
Here's how to detect and fight back against hackers who are using automated tools to attack your website.
READ MORE

Review: Avast Endpoint Protection Suite

August 9, 2012
Multiple levels of anti-malware protection combined with a community-based threat detection network and a centralized management server make Avast a compelling alternative for business-level virus protection.
READ MORE

Top 3 Insecure Password Management Practices

June 22, 2012
Even good admins sometimes do bad things with passwords. Spotting these risky IT practices in your organization is a first step to a more secure password management strategy.
READ MORE

How to Run Your Own Certificate Authority

June 13, 2012
Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.
READ MORE

How to Securely Delete Data from Hard Drives

May 20, 2012
Don't let that old hard drive leave the building without first scrubbing it clean of all data.
READ MORE