Don’t Let Drive Encryption Risk Losing Your Files

Drive encryption can help prevent sensitive data in laptops from being stolen. However, if a user forgets his or her password for a computer whose drive is encrypted with a tool such as BitLocker, the prospects for recovering files are much worse than otherwise. Without drive encryption, there are many hacks to recover files without…

Details

How Database Availability Groups streamline high availability in Exchange Server

Starting with Microsoft Exchange Server 2010, Database Availability Groups (DAG) have replaced a number of features that provided redundancy for purposes of high availability and disaster recovery. The earlier high availability approaches included Single Copy Cluster (SCC), Standby Continuous Replication (SCR), Local Continuous Replication (LCR), and Cluster Continuous Replication (CCR). Supporting these were the concepts…

Details

Share Excel Workbooks in SharePoint

When working in Excel on a file system, you can share the file so that multiple people can edit it, even simultaneously. However, you may wonder how to do a similar thing in Microsoft SharePoint. One way to do this is to publish portions of an Excel file as Web Parts. When editing a Web…

Details

Make sure your online backup is there when you need it

Online storage can be a great way back up files so that disasters that affect your building don’t wipe out your data. However, just because your data are backed up online doesn’t mean they’re safe.   As an example of how unreliable online storage can be, in October 2014, Bitcasa subscribers received a generic, spam-filter-triggering…

Details

Perform fail-safe firmware upgrades

A key component to maintaining the reliability and efficiency of your network is keeping the firmware on your network devices up-to-date. As you know, these devices can include managed switches, routers, wireless access points, and intrusion detection systems among others. Unfortunately, the device’s documentation doesn’t always provide the proper procedures for upgrading the firmware successfully.…

Details

Use care when upgrading hand-held operating systems

Upgrading operating systems has become almost automatic, as it’s a crucial element of security maintenance. However, rapid advances in computer hardware have made it easy to forget the need to also consider system resources when upgrading to any new operating system. Clearly, this becomes more of an issue with hand-held devices, which typically are far…

Details

Prevent man-in-the-middle attacks with DHCP snooping

A number of devastating attacks can be instigated by spoofing messages for some of the most fundamental network protocols, such as DHCP. For example, through DHCP spoofing, an attacker can create a fake DHCP server that’s privy to information it’s not supposed to have. This allows the attacker to carry out a man-in-the-middle attack to…

Details

Ten Characteristics of a Highly Successful Network Administrator

What Are the Traits of an Effective Network Administrator? In order to provide the level of reliability that management has come to expect, network administrators need to continue to exhibit some of the same attributes that they have always exhibited (e.g., tenacity, attention to detail and responsiveness). Network administrators, however, also need to be adaptable…

Details

Cybersecurity training a must for IT professionals

Cybersecurity is becoming a top business priority as more companies transfer their data to the cloud, leverage the Internet of Things to optimize their operations and adopt bring-your-own-device policies. As a result, IT professionals will need to advance their knowledge in cybersecurity, especially within the realm of cloud computing.   In response to a greater…

Details

Hard and soft skills for IT jobs

Having the technical abilities required for a job is an important part of getting hired, but so is possessing valuable soft skills. The combination of a person’s hard and soft skills are often what gets them chosen over another qualified candidate. Being able to demonstrate relevant capabilities during an interview can help land a job,…

Details