Expert Advice

EXPERT ADVICE

How to Have a Cybersafe Olympics Experience

As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...

Enterprises that have merged with or acquired the systems and assets of another company know how difficult it is to combine disparate systems -- platforms, databases and software solutions -- with its existing infrastructure. Mergers can be very disruptive, especially if the companies have standardi...

EXPERT ADVICE

Plan Ahead to Prevent Maintenance Window Pain

System administrators are well aware of the pain associated with maintenance windows. This effort is usually taking place off-hours and requires challenging coordination between different activities and often different departmental personnel. Although almost every system administrator will agree to ...

EXPERT ADVICE

VoFi Is Coming – Are You Ready?

In case you missed it, seven long years of wrangling have come to an end: 802.11n has now been officially ratified by the IEEE. Super-fast WiFi is here. The 802.11n standard ushers in increased network throughput and range that will change wireless access, services and applications. With this final ...

EXPERT ADVICE

The 5 Best-Kept SharePoint Management Secrets

Microsoft SharePoint Server is an incredibly versatile tool for setting up portals and Web sites that facilitate communication and collaboration within a company, between companies, and with Internet users at large. This versatility and the ability of SharePoint to boost productivity has made it the...

EXPERT ADVICE

Are We Risking Our Digital Lives?

Consumers are growing increasingly comfortable storing sensitive information on their computers, USB flash drives, and external hard drives, as well as using Web-based solutions to automate regular tasks such as shopping for holiday gifts, paying bills and tracking financial portfolios. At the same ...

EXPERT ADVICE

Improve Morale, Improve Security

Have you ever tried to work when you're really sick? I don't mean a little cough or sniffles. I'm talking about a genuine, drag-out, "can't get out of bed" illness -- the kind where it hurts to stand up, let alone go into the office. I hate to admit it, but I've gone to work in that condition -- you...

OK folks, Twitter may be a fad, but it is also a wealth of information into real people's problems, and I don't think it is going away anytime soon. In fact Google and Yahoo announced recently that they are going to begin crawling tweets, and they will appear in search queries. So yes, I am a fellow...

EXPERT ADVICE

Top 8 Enterprise Server Predictions for 2010

Although the enterprise server market has been among the hardest hit by the suffering economy, there is reason to be hopeful as 2009 draws to a close. I'd like to take a moment to share eight predictions of what we can look forward to in 2010 -- trends that have the potential to dramatically change ...

Data leakage prevention is a topic that has been getting a lot of attention lately. Keeping sensitive data from leaving the network has quickly risen to the top of many IT and compliance officers' lists of priorities. DLP will likely be the first thing most organizations spend their 2010 information...

EXPERT ADVICE

Throw Less Spectrum at It

"Throw more money at it." That's an old suggestion for trying to solve problems big and small, but it's a solution that rarely works, because it doesn't address the root cause of the problem in question. Despite knowing that it's bad advice, the FCC has recently come up with a corollary to it: Throw...

EXPERT ADVICE

5 Tips for Managing IT and Physical Access

Entering a physical facility should be just as secure as logging onto a PC. Security professionals often find themselves hard-pressed to secure both physical and logical assets. So why are so many organizations behind the curve when it comes to managing physical and logical access? There are dozens...

I first became aware of cross-site scripting (XSS) nearly a decade ago. At the time, despite being an all too prevalent bug in Web applications, the risk posed by the flaw was of limited value. It was the go-to vulnerability for any pen tester that was having trouble digging up a meaningful vulnerab...

EXPERT ADVICE

Relearning Trust in a Web 2.0 World

Social networking sites such as Facebook and MySpace rely on the trusted nature of the relationship between friends, colleagues, associates and followers. Unfortunately, the level of trust that end-users invest in each other is also being applied to the makers of applications and is perhaps a little...

EXPERT ADVICE

Save Yourself a Boatload of Hassle: Document

Remember the "Scantron" sheets that you had to fill out in school for taking standardized tests -- you know, the ones where you had to fill in the circle with a No. 2 pencil to mark your answer? Now imagine you're watching someone take a standardized math test -- you watch as they spend 15 minutes c...

Technewsworld Channels