Archive

Archive for December, 2005

VoIP Telephony: Benefits for Businesses

December 22nd, 2005
Comments Off on VoIP Telephony: Benefits for Businesses

Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.
Read more…

Articles

VoIP Telephony: Benefits for Businesses

December 22nd, 2005
Comments Off on VoIP Telephony: Benefits for Businesses

Steps for Establishing VoIP

To achieve convergence, companies can purchase an on-premise Internet protocol enabled phone system (IP PBX). Or they can lease a hosted Internet protocol Centrex service (similar to traditional Centrex, but IP-enabled) through which telecom equipment is housed by the supplier and features are delivered remotely. Hosted telecom services are gaining in popularity – especially with small to medium businesses. The hosted solution requires less capital and expense commitment, can be implemented quickly, requires less in-house technical expertise and is very scalable with your business since you pay a ‘per seat’ fee. IP PBX solutions are popular with larger enterprises that can afford the capital and expense commitment and have in-house technical expertise. Read more…

Articles

Review: SmartLine DeviceLock

December 22nd, 2005
Comments Off on Review: SmartLine DeviceLock

Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.
Read more…

Articles, Reviews

Small Businesses are Vulnerable to Security Attacks

December 22nd, 2005
Comments Off on Small Businesses are Vulnerable to Security Attacks

Study from the Small Business Technology Institute and Symantec reveals that more than half of small businesses have experienced at least one security incident in the past year. The study titled “Small Business Information Security Readiness” confirms that small business are increasingly vulnerable to attack and urges the adoption of security technology to protect information assets and minimize business risk.
Read more…

Articles

Microsoft to Acquire FrontBridge Technologies

December 22nd, 2005
Comments Off on Microsoft to Acquire FrontBridge Technologies

Following right of Microsoft’s purchase of nonexclusive rights to Finjan’s source code, Microsoft announced its intention to acquire FrontBridge Technologies, a company specializing in providing secure managed messaging solutions and services.
Read more…

Articles

Unified Threat Management will make IT Security Easier

December 22nd, 2005
Comments Off on Unified Threat Management will make IT Security Easier

Suddenly IT security has got far more complex. After all, a few years ago we were mostly worrying about spam. Now we can’t be sure what is going to hit us next after recent outbreaks of phishing, pharming and spyware.
Read more…

Articles

Symantec Products Hit by Critical Security Flaw

December 21st, 2005
Comments Off on Symantec Products Hit by Critical Security Flaw

Security firm Secunia reported Tuesday that a high-risk security vulnerability affects Symantec’s products, across both Windows and Macintosh platforms. The vulnerability could allow hackers to take control of a system remotely.
Read more…

Articles

Data Management for Compliance

December 21st, 2005
Comments Off on Data Management for Compliance

Compliance, Regulation and Statutory Legislation have become increasing burdens for the long-term storage of data. Legislation operates in tandem with a fierce economic climate that is keeping a tight grip on budgets and is dictating that IT operates with fewer skilled resources, whilst demands for service intensify. It is clear that a way must be found to satisfy these demands cost effectively whilst minimising corporate risk and exposure.
Read more…

Articles

Quick facts on CyberThreats

December 21st, 2005
Comments Off on Quick facts on CyberThreats

Some facts on cyber threats from Symantec Corp.´s regular security updates. North American computers are the source of more than half the spam worldwide, most of it related to commercial products such as porn, cut-rate drugs and financial services.
Read more…

Articles

Santa Claus Worm Targets IM users

December 21st, 2005
Comments Off on Santa Claus Worm Targets IM users

A Santa Claus worm is attempting to trick instant messaging users into clicking on a file that delivers unwanted software to user’s computer. Victims who click on the file see an image of Santa, but what they are less likely to notice is a so-called rootkit payload being installed onto their system.
Read more…

Articles