IT

This just in from the DEF CON security conference in Las Vegas on August 7: security researchers Paul Stone and Alex Chapman revealed that a default setting in Windows and one that is present in many web browsers across operating systems allows a compromised network...

Most hacks require some kind of user feedback.  Whether it’s visiting a certain website, opening a certain .exe file, or clicking “yes” on an OK button, exploits are usually something we have to allow. Apple identified a new bug last week, however, which uses a far more...

Resilience is a fashionable term in homeland security circles these days.  The idea is simple.  It’s impossible to predict or plan for every kind of emergency situation.  What you can do, however, is to plan for the time after an emergency comes. If there are structures and procedures in place to...

When it comes to technology, sometimes the whole is less than the sum of its parts. Most organizations tend to buy programs for their individual features, not thinking about how all of those programs will (or won’t) work together.  When all of those different programs start operating...

Mobility is making the lives of employees easier, but for employers it’s more of a mixed bag.  Mobile employees can be everywhere and anywhere – a huge boon for productivity and morale.  But for today’s I.T. administrator, mobility is a giant headache.  Keeping track of all that equipment,...