Author's articles

Closing the gaps in enterprise data security: A model for 360˚ protection
By Ted Weber · 14 years ago
Closing the gaps in enterprise data security: A model for 360˚ protection This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice ...
Effective email policies: Why enforcing proper use is critical to security
By Ted Weber · 14 years ago
Effective email policies: Why enforcing proper use is critical to security The unmonitored and unguarded use of email by employees poses a multitude of risks to organizations. The distribution of inappropriate or offensive content, malicious ...
Applications, virtualization, and devices: Taking back control
By Ted Weber · 14 years ago
Applications, virtualization, and devices: Taking back control Employees installing and using legitimate but unauthorized applications, such as Instant Messaging, VoIP, games, virtualization software, and unapproved browsers are a real and growing threat to business security ...
Protection for Mac and Linux computers: genuine need or nice to have?
By Ted Weber · 14 years ago
Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-Windows platforms is small but growing. As Mac and Linux computers become more prevalent within organizations, they ...
Is virtualization a black hole in your security? 5 ways to ensure it isn’t
By Ted Weber · 14 years ago
Is virtualization a black hole in your security? 5 ways to ensure it isn’t The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end ...
Laws, regulations and compliance: Top tips for keeping your data under your control
By Ted Weber · 14 years ago
Laws, regulations and compliance: Top tips for keeping your data under your control The challenge of complying with a growing number of frequently changing government, industry and internal regulations designed to protect data is becoming ...
Stopping data leakage: Making the most of your security budget
By Ted Weber · 14 years ago
Stopping data leakage: Making the most of your security budget Organizations are increasingly aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the ...
How to protect your critical information easily
By Ted Weber · 14 years ago
How to protect your critical information easily Safeguarding massive amounts of sensitive, confidential data—from legally protected personal information to intellectual property and trade secrets—from malicious attacks and accidental loss is one of IT’s biggest challenges. ...
Preventing Flats
By Ted Weber · 14 years ago
Preventing Flat Tires 1) Check your tire’s air pressure at least once a month! Underinflated tires not only cause an uneven ride and reduce gas mileage; they are more likely to go flat as well. ...
Tire Chains Guide
By Ted Weber · 14 years ago
Buying tire chains can be intimidating, confusing, and difficult. Follow these tips to ensure safety in the snow. When Purchasing 1.First, consider buying tire chains when you buy your tires. It may be easier to ...