Category: Windows
-
DFS in a Windows Server Infrastructure & DFS Replication
DFS (Distributed File System) is a Windows Server feature which allows System Administrators to create a single namespace to provide a replicated sharing infrastructure across the network. Large enterprises that have multiple offices interconnected must be able to allow their employees to access documents easily. This means that clients must connect to desired resources from […]
-
What is HIPAA Compliance?
HIPAA stands for the Healthcare Insurance Portability and Accountability Act of 1996. This specifies laws for the protection and use of Personal (or Protected) Health Information (PHI) – essentially, your medical record. HIPAA sets the standard for protecting sensitive patient data. The Administrative Simplification provisions of the Act (HIPAA, Title II) require the U.S. Department […]
-
NAP Enforcement (Network Access Protection)
NAP or Network Access Protection is a Windows Server security mechanism which enables you to control how computers gain access to network resources. The main functionality of NAP is to verify and ensure that only healthy computers will be marked as compliant and will receive network access. In this article we will talk about some […]
-
2014 Security Threats & the Impact of Cybercrime
The cost of cybercrime, mobile threats on the rise, Zero Day threats…what every business needs to know.
-
CIFS Monitoring & Industrial PC Security
CIFS – How to Protect Legacy Industrial PCs (IPCs) Before the popularity of cloud began to take over, the only choice that companies large and small had with regard to IT infrastructure, was to build their own network. This of course consisted of servers, web servers and workstations, all connected together for the purposes of […]
-
Common Printing Issues in Windows 8 – Troubleshooting Tips
Windows 8 has undergone a lot of change when compared to its predecessor Windows 7. One of the most noticeable changes in the OS is the new interface with tiles, a.k.a the Metro UI, which works on touch screens, as well. With the modern interface, users might sometimes feel like they are using two operating […]
-
Keeping cybercrime out – tips on network security
Threats to network security are greater today than they’ve ever been. From botnets to spies, everyone’s trying to get access to your system and its data. Among the biggest threats to networks are basic spyware and adware, denial of service attacks that can choke entire systems and bring them down, direct attacks by hackers and […]
-
Top Technology Trends of 2014, Pt. 2
…continued from Top Technology Trends for 2014 (trends 1-4) #5: The end of Windows XP With support for windows XP expiring after 8 April, it could be interesting to see how many companies, who still revere and use the product, will be left unprepared for its demise, and may therefore be taken by surprise and […]
-
8 Technology Trends for 2014
With the New Year already underway, there’s a lot of speculation around as to what the most popular trends are going to be in the technology community. So here are 7 tips as to what we might expect to see. For a change, we thought we’d throw in a little more consumer than usual … […]
-
How to use Windows Firewall to Authorize Connections
In this article I will show you how to use Windows Firewall to authorize connections before data can be sent between devices. Authorization offers you an extra security layer and should be used whenever possible. There are services or applications that include authorization rules so that only allowed users/computers can connect to certain network resources. […]