• Print

Securing The Network

Every day there is a new batch of viruses, spoofing, spamming and other illegal activities which can render your PC or network useless. What can you do to ensure the security of your network or PC and avoid the distress of combating a breach?

Are Your Computers Secure?

by Peter Philipp

If the computers in a business are not safe and secure - the business is at risk. The 10 areas detailed in this article provide a basis for assessing how much risk a business is exposed to.

Is Your Organisational Information Secure?

by John Halliday

IT systems form an integral component of all business processes, and are being attacked in a number of ways with increasing frequency. This requires shorter reaction times to deal with the attack before it impacts on the business. Often an organisation is unaware that an ‘attack' has taken place.

Busting Network Video Abuse

by Wayne Neich

Recreational video use at work is crashing company networks and starving business critical applications of the bandwidth they need.

Network Security - There Are No Grey Areas

by Howard Waterson

Millions of applications are installed on company networks each day without the permission of the company. These pieces of software are known as 'Greynets'. They are multiplying constantly and, with many remaining unknown and difficult to locate, they are damaging network performance, distracting staff, and creating a hole in network defences.

USB Control: How Do I Protect My Network?

by Howard Waterson

Employees and their gadgets are now the biggest threat to IT security.

Why Your Passwords Don't Protect You

by Maria Padisetti

Passwords are one of the many lines of defense against intruders. Your castle guards -- the login programs and the like -- believe that you are who you say you are because you have your password. Therefore, it is important to strengthen the passwords and safeguard them.

Internet Fraud Getting More Sophisticated

by NSW Business Chamber

Be aware that scammers are getting more sophisticated in tricking people to give them account names and passwords.

  • Print