Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Microsoft SharePoint security hinges on authorization, external user management
Management of external user access controls, authentication and authorization are important Microsoft SharePoint security best practices. This is the second of a two-part series of technical tips. Continue Reading
Start with centralized endpoint security management when buying suites
Single vendor centralized management of endpoint security suites, including policy creation and management, and compliance reporting is the primary consideration when choosing and buying an endpoint security suite Continue Reading
Think about performance, data protection when choosing endpoint security suites
Endpoint security suites offer multiple malware detection techniques and data protection features that appeal to midmarket IT organizations. This is part one of a two-part series on choosing endpoint security suites. Continue Reading
-
Poor Microsoft SharePoint security permissions policies can derail deployments
A strong Microsoft SharePoint security policy starts with proper permissions and access controls to internal resources, and to control external users. This is the first of a two-part technical tip. Continue Reading
Get more out of your security event log data
Your network has plenty to say about your organization's threat posture. These three tips will help you get the most out of security log management tools. Continue Reading
PCI DSS requirements include strong access control procedures
The fourth focus of PCI DSS requirements governs how organizations enable and restrict access to cardholder data and limit physical access to cardholder data.Continue Reading
Five network security issues to avoid
This podcast covers some common network security issues and how you can go about avoiding them in your organization.Continue Reading
Find remote mobile device wipe solutions on a budget
Several remote mobile device wipe solutions are within the price range of a midmarket company. This is the second of two parts.Continue Reading
Remote phone lock and GPS tracking counter smartphone security risks
Lost or stolen smartphones pose serious security risks to data, but remote device lock technology and GPS tracking can help mitigate those risks. This is the first of two parts.Continue Reading
How to rework your network infrastructure for security
Retooling your existing network infrastructure for security requires less complexity and more attention to basics such as switches, centralized authentication, UTMs and network segmentation.Continue Reading
-
How to use Excel for security log data analysis
Microsoft Excel can be an inexpensive and effective option for firewall, antivirus and server log analysis.Continue Reading
Acceptable use policy for Internet usage helps data protection efforts
Acceptable use policies are an inexpensive, yet effective, control in limiting exposure to data breaches.Continue Reading
Checklist: Three firewall configuration tips
If you are revisiting your firewall configurations, consider these three tips to help you monitor and manage your network traffic.Continue Reading
Network-based integrity monitoring keeps website hacks in check
Network integrity monitoring software brings the concept of file-based integrity monitoring, required by regulations such as PCI-DSS, to a company's online presence.Continue Reading
Avoid compliance mistakes as you outsource
Providers may be required to be compliant with PCI, but that doesn't liberate merchants from liability in the event of a breach.Continue Reading