Protecting your data

From: http://www.theregister.co.uk/2013/10/17/indonesia_number_one_attack_source/?utm_source=twitterfeed&utm_medium=twitter "Indonesia has had the dubious honour of supplanting China as the number one source of attack traffic globally in the second quarter, according to the latest stats from content delivery and security firm Akamai. The vendor’s State of the Internet report for Q2 found Indonesia accounted for 38 per cent of the world’s…

Read more

Your employees could be your number one security threat

From Article: http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/insider-threats-big-problem-shouldnt-surprise/ "I was just reading the results of a Forrester study called, “Understand the State of Data Security and Privacy.” One of the big findings was that “insiders” were the top source of breaches in the last 12 months, with 36% of breaches attributed to the (often inadvertent) misuse of data by employees.…

Read more

The Eight Essential Metrics for Desktop Support

The average Desktop Support organization tracks fewer than 5 KPI's.  However, there are literally hundreds of KPI's that have been defined for Desktop Support.  The vast majority of these metrics, however, are only marginally relevant – at best! When it comes to KPI's for Desktop Support, less is more!  The eight that really matter are…

Read more

Mobility and the future of tablets in the workforce

Dell is developing some nice tablets! http://www.techpageone.com/technology/infographic-empowering-mobile-workforce/#.Ulz7Y6Pn-Uk Is your organization set up to fully empower your mobile workforce? As tablets and other mobile devices continue to change the way people work, you need to make sure to keep up with your end users’ needs. If you haven’t given much thought to tablet adoption and desktop…

Read more

Planning For Productivity In The Office

Workstations are as unique as the people that use them. Their is no good cookie cutter solution to this. Typically what I have found is dual displays is always a good thing. Running duals always increases productivity. Studies have shown at least a 30% improvement. The other thing is a good chair. The more adjustable…

Read more

HP Versus The World

Reposted from Tom's Hardware: http://www.tomshardware.com/news/hp-intel-microsoft-meg-whitman-android,24616.html Meg Whitman says, "HP's traditional highly profitable markets face significant disruption. Wintel devices are being challenged by ARM-based devices," she said. "The disruptive forces are very tough and very real, and they are accelerating. We are seeing profound changes in the competitive landscape. Our competitors are expanding across the IT…

Read more

Trust People, Not Addresses

Don’t trust unsolicited files or embedded links, under any circumstances.   It’s easy to spoof e-mail addresses, so that an e-mail seems to come from someone other than the real sender (who may in any case be a spam tool rather than a human being). Basic SMTP does not validate the sender’s address in the…

Read more

Good Password Practices

Use different passwords for your computer and online services. And it is good to segment your online service passwords, or keep them altogether different.  I have seen a number of systems for doing this; some bad, some mediocre, and some extremely sophisticated.  My favorite involves a root password that varies depending on the year, and…

Read more

Do you need administrative privileges?

Use an account on your computer that doesn’t have administrative privileges to reduce the likelihood of installing malware; and to reduce the likelihood of making severe and catastrophic changes to your system.  Password protect the “administrator” account, and create a “limited” user account for daily use.   Most system administrators adhere to the principle of…

Read more

Catch The Patch Batch

Keep your OS and applications up to date with automated updates and patches and by regularly reviewing the vendors’ product update sections on their websites. Sometimes it seems that the whole world assumes that the only vendor that suffers from vulnerabilities is Microsoft. To see how misleading claims like this can be, check out the…

Read more

Don’t Let Autorun Be Autoinfect

AutoRun has presented such a problem in recent years. There is a wide range of malware families that install or modify autorun.inf files in order to infect systems. In recent years, Microsoft has taken steps to address this loophole: First, by turning off AutoRun by default in Windows 7, then by making patches available for…

Read more

Does my file server need antivirus?

A good question that gets a lot of lively discussion in network administration circles. If your server is exposed to the internet in any way except through the connected workstations, it needs to be protected with some sort of anti-virus solution.  There is a serious misconception borne out of the belief that if the computers…

Read more