Archive

Archive for September, 2004

An IT Manager’s Insight into Mobile Security

September 30th, 2004
Comments Off on An IT Manager’s Insight into Mobile Security

Mobile security is a hot issue, but who is listening? Who really cares? The mere word of security sends most people running. Investing in preventative IT security has never been a very popular topic. Most board directors clam-up and switch off at the words “Your company could be at risk if you don’t invest in XXX technology”. It’s a hard sell for IT managers and it often takes a competitor or themselves to become a victim of crime before they sit up and listen.
Read more…

Articles

Defending IT Infrastructure Through Effective Patch Management

September 28th, 2004
Comments Off on Defending IT Infrastructure Through Effective Patch Management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. While driving into the office, half-listening to the radio news, you hear your bank’s name being announced, immediately followed by the words “hacker”, “massive system failure” and “identity theft”.
Read more…

Articles

XP SP2 distribution accelerated, VPN problem fixed

September 23rd, 2004
Comments Off on XP SP2 distribution accelerated, VPN problem fixed

Microsoft will accelerate the rollout of Windows XP Service Pack 2 over the next month and has released the first official update for SP2 to fix a problem some users had with VPNs.
Read more…

Articles

Intrusion Prevention Systems

September 23rd, 2004
Comments Off on Intrusion Prevention Systems

The inadequacies inherent in current defences has driven the development of a new breed of security products known as Intrusion Prevention Systems (IPS).
Read more…

Articles

The Dangers of Spyware

September 20th, 2004
Comments Off on The Dangers of Spyware

Spyware programs are applications that send information via the Internet to the creator of the spyware, or the publisher. Spyware usually consists of core functionality and functionality for information gathering.
Read more…

Articles

10 Things you should know about IT Training

September 15th, 2004
Comments Off on 10 Things you should know about IT Training

In the bid to acquire skills and knowledge in today’s information age, many are turning to IT Training. For many individuals and organizations, the need for training has never been greater. This hunger for IT training is driven by the rapid rate of change in all spheres of life that are now affected by information technology. Individuals and organizations are making efforts to keep pace with the “latest” technical advancements.
Read more…

Articles

Biometrics in the Workplace

September 13th, 2004
Comments Off on Biometrics in the Workplace

With recent events in mind, employees are demanding that companies around the world look at new security measures to protect them and the companies themselves. In fact, according to a recent Harris Interactive survey, conducted for Privacy & American Business, a majority of employees feel that their employers should be strengthening ID procedures for entering premises and accessing computer systems, as well as doing more detailed background checks on job applicants.
Read more…

Articles

Public Key Infrastructure – Technology or Hype?

September 9th, 2004
Comments Off on Public Key Infrastructure – Technology or Hype?

PKI has been getting a lot of bad press of late, but is it justified? Has the technology failed or is it a problem of implementation? First it is important to distinguish between public key cryptography (as discovered by Rivest, Shamir and Adelman, or Clifford Cocks) and PKI or public key infrastructure.
Read more…

Articles

Know Your Enemy: Learning about Security Threats

September 6th, 2004
Comments Off on Know Your Enemy: Learning about Security Threats

Ever wanted to monitor what´s going on in the internet by seeing it first hand? Well honeypots enable you to do that. This book is an official release of the HoneyNET Project, the leaders in honeypot technology. The book “Know Your Enemy: Learning About Security Threats” is extremely informative and detailed. From here on out, I will be referring to this book as “KYE”(Know Your Enemy).
Read more…

Articles, Reviews

Are You Indulging In Unprotected Wireless?

September 3rd, 2004
Comments Off on Are You Indulging In Unprotected Wireless?

Wireless PCs and wireless laptops are being increasingly used in both business and the home. The reason for this marked trend is that wireless computers are easy to deploy, cheap and are usually simpler to manage than standard wired connections. In the business world, smaller companies with two to two hundred and fifty users, find that wireless computing frees them from the conventional restrictions of cabling. Once a wireless device has been installed, new PCs or laptops can be added without the hassle of wiring them in.
Read more…

Articles