Tablets stories - Page 28
Best security practices
Tue, 1st Feb 2011
#
cybersecurity
#
symantec
#
passwords
Harness top security practices: From patching software to encrypting data, discover how best to protect your digital landscape.
VoIP attacks to grow in 2011
Mon, 17th Jan 2011
#
firewalls
#
network infrastructure
#
network security
The last few months have seen VoIP scans and attacks increase significantly, says WatchGuard - ten security predictions inside.
Dynamic, sophisticated and potentially deadly - Imperva details security trends for 2011
Wed, 17th Nov 2010
#
document management
#
ecm
#
martech
Imperva reveals top 2011 security trends, highlighting threats from mobile devices, cloud data security, and social network privacy.
An appropriate level of security
Mon, 1st Nov 2010
#
apps
#
cloud services
#
tablets
These are very specific and diverse cases that highlight the necessity of understanding just what security really means to you.
Storage starter
Wed, 1st Sep 2010
#
data protection
#
private cloud
#
cloud services
Digital data is growing at a staggering rate, posing challenges in storage and management. SMEs need efficient strategies, often turning to cloud services.
How to… Implement a workable back–up plan
Wed, 1st Sep 2010
#
dr
#
cloud services
#
insurance
Cloud services are transforming disaster recovery. To build a robust back-up plan, consider network bandwidth and seeding backups, plus offsite storage.
Small business feels security pinch
Sun, 1st Aug 2010
#
data protection
#
cybersecurity
#
tablets
SMBs tackle soaring cyber threats, allocating hefty budgets and IT manpower to shield data amidst rising incidents of attacks and data loss.
Reasons to go green
Sun, 1st Aug 2010
#
datacentre infrastructure
#
power / energy
#
clean technologies
Green computing steps into the spotlight, promising a blend of eco-friendly tech solutions that slash energy costs and safeguard the future.
SMBs should take security more seriously
Fri, 2nd Jul 2010
#
distribution central
#
distributors
#
tablets
AVG warns SMBs are neglecting vital IT security policies, offering essential steps to safeguard against online threats.
Locking the bathroom window
Sat, 1st May 2010
#
firewalls
#
data protection
#
network infrastructure
Endpoint security is crucial. Like securing bathroom windows in a house, neglecting PoS terminals and embedded devices leaves your network exposed.
Sophos strengthens data protection strategy
Fri, 16th Apr 2010
#
firewalls
#
network infrastructure
#
datacentre infrastructure
SafeGuard Enterprise 5.50 is a multi-layered endpoint data security encryption and data leakage prevention solution.
HELP US TO HELP YOU
Mon, 1st Mar 2010
#
apple
#
apple iphone
#
chillisoft
If your XP taskbar becomes locked for some reason, you can unlock it by right-clicking the Start button, choose Properties.
Exeed signs two new product ranges
Wed, 10th Feb 2010
#
firewalls
#
network infrastructure
#
network security
The distributor has announced that it will now offer Luxul Wireless products and Lockitdown hardware security devices.
Unite to secure!
Tue, 1st Dec 2009
#
malware
#
cybersecurity
#
management
As threats become more sophisticated, enterprises must shift from scattered, costly security measures to unified solutions for comprehensive protection.
MOT signs with Revera
Tue, 13th Oct 2009
#
network infrastructure
#
software development
#
revera
The Ministry of Transport has extended its ICT agreement with Revera, making it one of the company's top clients.
Securing data in an information-centric world
Thu, 1st Oct 2009
#
virtualisation
#
partner programmes
#
strategy
Ken Berryman of Symantec discusses the crucial shift from system-centric IT to protecting mobile information amidst rising data risks and compliance challenges.
Harbouring a winner
Fri, 1st May 2009
#
tablets
#
it support
#
relationships
With humble beginnings as an in-house IT support team for East Harbour Management Services Ltd, EastHarbour IT has grown to become a business in its own right.
Searching the paperless society
Wed, 1st Apr 2009
#
risk & compliance
#
pdf
#
tablets
eDiscovery: The process of searching for electronic documents for legal action is costly and time-consuming for businesses.
Why perimeter security is not enough
Wed, 1st Oct 2008
#
ddos
#
risk & compliance
#
wireless networks
Mark Edmead stresses that effective security encompasses processes and people, not just tech, challenging outdated perimeter-focused strategies.
Your data is at risk
Mon, 1st Sep 2008
#
data analytics
#
martech
#
planning
There is no escape and your data is at risk. Here is my challenge to you. Rethink the way you transfer information.