Hotmail phishing attack: How to avoid becoming a victim

This week’s phishing attacks on Hotmail, Gmail and Yahoo! Mail, which resulted in thousands of email addresses and passwords being posted online, have worried internet users. But there are some simple steps you can take to avoid becoming a victim of cyber criminals…

The Art of Creating Strong Passwords

While security has never been more important than it is today, the fastest way for an IT professional to become the most despised person in the company is to start enforcing a strong password policy. A policy perceived as overbearing may cause people to write down their passwords on a sticky-note near their computers, circumventing its very purpose…

10 ways IT departments waste money

IT is often a popular target for corporate cost-cutting. So the more you can identify and control unnecessary spending, the better you’ll be able to fend off the budget axe. Here are a few areas where IT dollars often go to waste…

Don’t Cut IT During a Downturn

When we learned to drive many years ago, back in the age of rear wheel drive, we were both taught to “turn into the skid” because our natural instincts to turn away only made things worse. In a recession, business management’s reflexes suffer the same problem…

Don’t waste time, money, and effort trying to DIY an IT network for your business. Read our eBook to learn whyDownload now
+