-
Your Cyber-Threat Assessment for 2016
The year just past saw several high-profile cyber-attacks hit the news, and brought the whole issue of cyber-security firmly into the spotlight. With the lessons still being learned from 2015 in mind, let’s look ahead to what you should be wary of in the months to come. Home is Where the Hurt Is? “Smart” domestic […]
-
Best Practices for Monitoring Windows Logins
Enterprise network administrators usually implement some security and access control measures over standard user accounts, but may neglect service accounts, which become vulnerable targets. As proof against threats from malicious users inside or outside the enterprise – and to comply with regulatory authorities – it’s essential to keep a close eye on what’s […]
-
Best Practices for Monitoring Microsoft IIS Web Server
If you’re working on a Microsoft Windows NT or 2000 platform, chances are you’ll be using Microsoft Internet Information Services (IIS) to build and administer your Web site, search engine, databases, and related applications. This guide will help you monitor and optimise your working environment. What is Microsoft IIS Web Server? Formerly known as Internet […]
-
Will Windows go Open Source?
At the ChefCon meeting in April of this year, engineer Mark Russinovich (Chief Technical Officer of Microsoft’s cloud computing platform, Azure) revealed to conference delegates that [in his words] “it’s definitely possible” that Windows could take the open source route. Eventually. “Definitely possible”. But is that all? A Closed Shop Traditionally, Microsoft Windows and […]
-
Best Practices for Monitoring Microsoft Exchange
If your scheduling and email services run on the Windows Server platform, chances are you’ll be using Microsoft Exchange. As a systems administrator, it’s your responsibility to make sure that things run smoothly. If you know what to watch out for, your job will be that much easier. This guide should help. What is Microsoft […]
-
51 DevOps Influencers to Start Following Today
While the objectives of DevOps are to stop wasting time and money on IT projects that become slow, unwieldy and incredibly bureaucratic, the whole concept is really about people- perhaps more so than technology. It’s probably for this very reason that a community of evangelists and advocates has grown and become instrumental in sharing […]
-
How to Prepare for a DDoS Attack
With much of today’s commercial activity conducted via the Internet, it’s no wonder that corporate entities find themselves the target of assault by online intruders. Cyber-attacks are now an accepted part of life – and it’s up to administrators and security officers to establish how best to prepare and defend their organisations against them. […]
-
What is a Private Cloud?
According to the National Institute for Standards in Technology (NIST), cloud computing as a whole provides a measured and on-demand self-service, with pooled resources, broad network access, and the rapid and elastic scaling of resources. And it’s on the rise – particularly with corporate clients. But there’s still some confusion about its various […]
-
Legacy Windows Survey
Have you wondered how many companies are still relying on old versions of Windows that are no longer supported? Windows 2000, XP and 2003 for example? Would you like some help convincing your boss that it’s time to upgrade? Take this quick 3 question survey and together we’ll all find out what that landscape […]
-
18 Great Tips and Tricks For Windows 10
Windows 10 arrived relatively recently to much fanfare. However, early adopters were often faces with a less than premium experience. As is often the case with new software these days, Windows 10 seems to have been released as a somewhat work in progress with bugs and idiosyncrasies abound for Microsoft’s newest operating system. […]
Got any book recommendations?