You are in: Articles
Latest Articles in Latest email related articles

10 things to keep in mind when purchasing a new server

(Brien Posey, TechRepublic) If you’re in the market for a new server, you need to evaluate your choices carefully to make sure the one you buy will meet your needs.

A network server is a big investment and usually represents a long-term commitment, so it’s critically important to select one that will meet all your needs. Here are some things you should consider when you go shopping for a new server:
1. Drivers
2. Redundancy
3. Hot-swappable components
4. Form factor
5. Fault tolerant memory
6. Storage
7. CPU support
8. Connectivity
9. Memory capacity
10. Manageability
Rating: 12345

10 challenges facing IT

(Alan Norton, TechRepublic) IT is always facing challenges. Some of these challenges have slowly changed over time, but many of them are perennial offenders. How will IT meet these challenges today and in the near future? Where do they rank in order of importance at the company where you work?

1. Customer service
Improve customer service by listening to and meeting the client’s needs. Make customer service job number one.
2. Human resources
Develop creative ways to minimize stress, satisfy employee needs, and match corporate needs to employee goals.
3. Productivity
Make the best use of new technologies like cloud and mobile computing but search out additional ways to increase productivity.
Read more by following the "full article" link.
Rating: 12345

How to Reduce Malware-Induced Security Breaches

(Steve Dispensa, eWeek) Malware has caused the industry to rethink its security best practices, introducing tools such as transaction verification to guard against real-time, man-in-the-middle attacks. Out-of-band authentication mechanisms are growing rapidly in popularity. While it is certain that malware will continue to evolve, Knowledge Center contributor Steve Dispensa offers four simple steps you can take to significantly reduce your malware-induced security breach exposure.

In a recent survey of IT professionals, over 32 percent felt that malware installed on PCs will pose the greatest external threat to IT security over the next 12 months. Over 16 percent indicated that malware on mobile devices presented the greatest threat. In total, malware running on PCs and mobile devices was ranked the top threat for 2010 by nearly 50 percent of respondents.

Fortunately, there are four concrete steps you can take to prevent malware threats in your organization:
  1. Step No. 1: Have a corporate anti-malware solution
  2. Step No. 2: Patch!
  3. Step No. 3: Deploy strong authentication
  4. Step No. 4: Use transaction verification
Rating: 12345

Surge in malware marks start of year

(Lance Whitney, CNET) The first three months of the year have so far witnessed a rise in malware and some notable cyberattacks, according to a report released today by Panda Security.

Tracking a big jump in malware (PDF), Panda Security has uncovered on average around 73,000 new types of threats being released every day. That's a 26 percent increase during this year's first quarter compared with the same period in 2010.

Among the various flavors of malware, Trojan horses have accounted for around 70 percent of all threats so far this year. That points to Trojans as a tool favored by cybercriminals who use them to grab bank account information and other personal data directly from their victims.
Rating: 12345

Corporate data breach average cost hits $7.2 million

(Ellen Messmer, Network World) The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009.

The Ponemon Institute's annual study of data loss costs this year looked at 51 organizations who agreed to discuss the impact of losing anywhere between 4,000 to 105,000 customer records. The private-sector firms participating in the Ponemon Institute's "2010 Annual Study: U.S. Cost of a Data Breach" hail from across various industries, including financial services, retail, pharmaceutical technology and transportation.

While "negligence" remains the main cause of a data breach (in 41% of cases), for the first time the explanation of "malicious or criminal attacks" (in 31% of cases) came in ahead of the third leading cause, "system failure."

It turns out "malicious or criminal attacks" are the most expensive type of data breach to discover and respond to, costing on average $318 per customer record, $151 more than non-malicious breaches that stem from negligence of system failure.
Rating: 12345
Close send to email window

Verification code

Already a member?
Blacklist monitoring alerts
sign up Signup for our real-time monitoring service and receive email notifications each time one of your IPs gets blacklisted.
Free Signup
Mail Server Operating System Poll

What OS do you use for your email server?
disabled next

How many mailboxes do you currently manage?
previous next

Would you like to comment upon the choosing of this particular OS?

DNS Tools
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Ping Statistics
Reverse DNS Lookup
Whois Info (IP owner)
GeoIP Information
Check Port
Open Relay Test
Test if your mail server is an open relay for spammers.
Blacklist Checker
Check if your IP is listed in DNS based email blacklists (DNSBL)