|
|
OS Patching, Add It To Your Security Policy |
|
Information technology personnel have grown accustomed to the virtual onslaught of security updates, or patches, that are released monthly, weekly and sometimes even daily for the key operating systems on their networks. With ... |
|
|
|
|
|
|
29.03.07
|
|
|
|
|
|
7 Sins Of Information Risk Management |
|
Information Risk constitutes any possible event that will prevent information from being used as the business intended it to. Successful information management mitigates all information related risks and ensures that ... |
|
|
|
|
|
|
22.03.07
|
|
|
|
|
|
EIM & SaaS, Evaluating For Reliability |
|
The demand for automated incentive compensation has brought it into the on-demand world. Implementing a world-class enterprise incentive management (EIM) system is essential given todays fierce global competition, and as ... |
|
|
|
|
|
|
06.03.07
|
|
|
|
|
|
Stop Slurping On Your Networks |
|
How can you fight pod slurping in your offices? No, its not a plant-care issue, but the threat from malicious parties hijacking business data using USB devices, such as MP3 players, memory sticks or digital cameras. Some ... |
|
|
|
|
|
|
05.03.07
|
|
|
|
|
|
The Dirty Dozen, Killing False Positives |
|
In the classic war movie The Dirty Dozen, Lee Marvins maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. Its a near-impossible ... |
|
|
|
|
|
|
15.02.07
|
|
|
|
|
|
The Importance Of Being Interesting |
|
I dont think I would be exaggerating if I said that a high percentage of the material dealing with the topic of Business Continuity (BC) is diabolically dull. There is a croaking, all pervading, dusty dryness which coughs from ... |
|
|
|
|
|
|
09.02.07
|
|
|
|
|
|
E-Filing For Beginners |
|
E-mail is the new paper. It is now used for over 80% of written business communication. Given the exponential rise in e-mail-based business communication over recent years, there is a definite need for the e-filing cabinet, in ... |
|
|
|
|
|
|
02.02.07
|
|
|
|
|
|
Me, Myself & iPod |
|
According to research by Marc Prensky consultancy, the typical 21-year old graduate entering the workplace has approximately 5000 hours of gameplay experience, exchanged 250,000 e-mails and instant messages, spent 10,000 hours ... |
|
|
|
|
|
|
01.02.07
|
|
|
|
|
|
Turning Regulation Lemons To Lemonade |
|
Half full or half empty? Companies can regard compliance with the past five years of regulatory frenzy, as a burden that threatens their financial balance sheet or even their operational capacity. Or as an opportunity to ... |
|
|
|
|
|
|
30.01.07
|
|
|
|
|
|
Test Before You Leap |
|
Like many people, I am a prolific reader of the newspapers and keep up with news and current affairs by reading at least one a day. Yet, for a while now, and I must say with growing frustration, Ive noticed an increase in ... |
|
|
|
|
|
|
25.01.07
|
|
|
|
|
|
A Practical Guide To Continuity Planning |
|
While critical information is the lifeblood of every organisation, small companies often spend more time planning their company picnic than they do for an event, which could put them out of business! Certainly, the threat of ... |
|
|
|
|
|
|
17.01.07
|
|
|
|
|
|
Best Practices For Preserving Security |
|
The centralisation of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of branch offices and consolidating IT infrastructure to ... |
|
|
|
|
|
|
22.12.06
|
|
|
|
|
|
Using Compliance To Your Advantage |
|
Compliance has propelled storage from back office obscurity to the top of the boardroom agenda and with its newly raised profile comes newly raised budgets, the likes of which would have previously been unimaginable for a ... |
|
|
|
|
|
|
19.12.06
|
|
|
|
|
|
The Lost Art Of Managing Risk |
|
The speed of technology evolution and adoption is increasingly taking away our ability to assess and manage its impact on business with the overrun creating massive governance and operational gaps resulting in exposure and ... |
|
|
|
|
|
|
15.12.06
|
|
|
|
|
|
Dispelling Common Patching Myths |
|
According to an April 2006 report from the Yankee Group, the various security investments enterprises have made do, indeed, make it more difficult for criminals, spies and miscreants to break into corporate ... |
|
|
|
|
|
|
08.12.06
|
|
|
|