Latest Articles on MailRadar Latest Articles on MailRadar en-us Mon, 25 Sep 17 07:55:06 +0000 30 MailRadar 10 things to keep in mind when purchasing a new server (Brien Posey, TechRepublic) If you’re in the market for a new server, you need to evaluate your choices carefully to make sure the one you buy will meet your needs.A network server is a big investment and usually represents a long-term commitment, so it’s critically important to select one that will meet all your needs. Here are some things you should consider when you go shopping for a new... Mon, 02 May 11 21:00:00 +0000 10 challenges facing IT (Alan Norton, TechRepublic) IT is always facing challenges. Some of these challenges have slowly changed over time, but many of them are perennial offenders. How will IT meet these challenges today and in the near future? Where do they rank in order of importance at the company where you work?1. Customer serviceImprove customer service by listening to and meeting the client’s needs. Make customer service... Tue, 19 Apr 11 21:00:00 +0000 How to Reduce Malware-Induced Security Breaches (Steve Dispensa, eWeek) Malware has caused the industry to rethink its security best practices, introducing tools such as transaction verification to guard against real-time, man-in-the-middle attacks. Out-of-band authentication mechanisms are growing rapidly in popularity. While it is certain that malware will continue to evolve, Knowledge Center contributor Steve Dispensa offers four simple steps you can take to... Mon, 11 Apr 11 21:00:00 +0000 Surge in malware marks start of year (Lance Whitney, CNET) The first three months of the year have so far witnessed a rise in malware and some notable cyberattacks, according to a report released today by Panda Security.Tracking a big jump in malware (PDF), Panda Security has uncovered on average around 73,000 new types of threats being released every day. That's a 26 percent increase during this year's first quarter compared with the same... Tue, 05 Apr 11 21:00:00 +0000 Corporate data breach average cost hits $7.2 million (Ellen Messmer, Network World) The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009. The Ponemon Institute's annual study of data loss costs this year looked at 51 organizations who agreed to discuss the impact of losing anywhere between 4,000 to 105,000 customer records. The private-sector... Tue, 08 Mar 11 22:00:00 +0000 Beware the coming corporate smartphone threat warn experts (Lia Timson, ITWire) Rogue smartphone applications coupled with social engineering will be the undoing of corporate IT infrastructures, network security experts have warned.As more and more enterprises succumb to the temptation of allowing employee devices to be used for work purposes - either because of cost or pressure from senior management - the threat to their IT systems security is rising.Speaking at the RSA... Wed, 02 Mar 11 22:00:00 +0000 Five tips for deciding whether to virtualize a server (Brien Posey, TechRepublic) Not all servers are suited for virtualization. Be sure you consider these possible deal-killers before you try to virtualize a particular server.Even though server virtualization is all the rage these days, some servers simply aren’t good candidates for virtualization. Before you virtualize a server, you need to think about several things. Here are a few tips that will help... Tue, 22 Feb 11 22:00:00 +0000 Security departments not prepared for new technologies (Joan Goodchild, CSO) Rapid adoption of mobile technology, social media and cloud computing in the workplace is creating a security problem for IT departments worldwide as they struggle to keep pace with demands, according to a survey released this week by security certification firm (ISC)².The 2011 (ISC)² Global Information Security Workforce Study (GISWS) finds an increasing pressure to provide... Sun, 20 Feb 11 22:00:00 +0000 Low security awareness found across IT (Jaikumar Vijayan, ComputerWorld) A broad spectrum of IT people, including those close to security functions, appear to have little awareness of key security issues impacting their organizations, a new survey shows.About 22% of respondents claimed to be extensively involved in security functions, 60% claimed a limited or supporting role, and the rest said they were not involved with security at all. About 100... Thu, 10 Feb 11 22:00:00 +0000 10 tech trends to watch in 2011 (Gil Kirkpatrick, TechRepublic) Based on the results of surveys conducted at The Experts Conference last year, analysts at Quest Software have put together this set of predictions for the upcoming year.There is a lot of buzz right now over cloud services adoption, platform vendor battles, and shifting technology investment strategies, but, what  happens in 2011 - and what doesn’t - will be... Sun, 06 Feb 11 22:00:00 +0000 10 things to look for in a data center (Erik Eckel, TechRepublic) Going to the cloud might make a lot of sense for your organization — but only if you choose a secure, reliable data center that can handle your needs. Erik Eckel runs through 10 essential criteria for data center evaluation.Everyone’s going to the cloud. The cloud’s all the rage. Almost no IT discussion is complete without mentioning “the... Thu, 03 Feb 11 22:00:00 +0000 Forrester: 2011 security strategy recommendations (Khalid Kark, NetworkWorld) Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to properly supporting the rising adoption of social technologies, employee-owned mobile devices, and cloud services. Given security leaders' pain points and focus... Tue, 25 Jan 11 22:00:00 +0000 Cybercriminals shifting focus from PCs to mobiles (Stuart Corner, ITWire) Cisco has released its annual security report saying it shows "a major cybercrime turning point" in that cybercriminals have begun shifting focus from Windows PCs to smartphones, tablets and mobile platforms in general.The report says this shift in focus is the result of three factors: significant improvements in security in the Windows environment: weak security in mobile... Sun, 23 Jan 11 22:00:00 +0000 Top 10 Tech Scares of the Decade (Sarah Jacobsson Purewal, PCWorld) The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first 10 years passed uneventfully - well, aside from Y2K and a bunch of intelligent computer viruses. Here's a look back at the past decade, and ten of the most terrifying tech scares.The past ten years saw some terrifying... Mon, 10 Jan 11 22:00:00 +0000 Virtual, mobile, social endeavors drive IT in 2011 (Ann Bednarz, NetworkWorld) Caution still pervades the economic forecasts, but it's not deterring IT executives from aggressively expanding their virtualization efforts, extending mobility initiatives, and tackling newer priorities such as cloud computing and enterprise social media adoption. "If it's out there and if it can help us, we're looking at it," says Ron Smith, director... Tue, 04 Jan 11 22:00:00 +0000 New Year's Tech Resolutions for Small Businesses (Christopher Null, ComputerWorld) There's no telling what the future will bring, but one thing is sure: In the world of technology, nothing stays the same for very long. The year 2010 wasn't terribly turbulent for tech, but 2011 is shaping up to be more of a thrill than you might expect. From Android's scorched-earth march across the industry to malware threats that we have yet to wrap our arms... Tue, 28 Dec 10 22:00:00 +0000 Axigen Free Mail Server - A Great Alternative to Open Source Are you planning to jump on the “open source software” bandwagon? Or contemplating the idea of switching from an open source setup to a commercial solution? Here are a few considerations to keep in mind.This article discusses the features and benefits that the Axigen Free Mail Server offers compared to open source solutions. It provides a comprehensive analysis of the factors that IT and... Wed, 22 Dec 10 22:00:00 +0000 10 year-end tasks for network administrators (Rick Vanover, TechRepublic) With 2010 coming to a close, this is a great time to get things in shape for next year. Here are some tips to help you get ready for 2011.1. Use up that remaining budget2. Get your software and hardware maintenance up to date3. Check for obsolete components4. Check for powered off systems5. Rearrange racks and servers6. Updates BIOS, firmware, versions7. Chase down the old operating... Sun, 19 Dec 10 22:00:00 +0000 Five cloud security trends experts see for 2011 (Bob Violino, CSO) What do CSOs and other IT security experts expect to be top-of-mind cloud security issues in 2011? Here are five things to watch for in the coming year:1. Smart phone data slinging2. Need for better access control and identity management3. Ongoing compliance concerns4. Risk of multiple cloud tenants5. Emergence of cloud standards and certificationsRead more by following the "full... Thu, 16 Dec 10 22:00:00 +0000 7 Scrooge-worthy scams for the holidays (Joan Goodchild, NetworkWorld) All crooks want for Christmas is to steal your money and sensitive information. Security experts give tips on avoiding scams.The 2-week mark before Christmas is when things start to ramp up out of control. Spammers and malware authors focus on when the attention is going to be there. And you don't need to be shopping online to get caught in one of their traps. Even checking out... Mon, 13 Dec 10 22:00:00 +0000 Top Security Predictions for 2011 (Tony Bradley, PC World) It's time to look ahead to 2011 with some predictions for what the year holds in store for security.Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting on the year gone by, and looking ahead to what the next year might hold. Hence, it's a good time to have a look at what 2011 holds in store for security:1.... Sun, 05 Dec 10 22:00:00 +0000 Report: Spam down, but malware continues hold (Lance Whitney, CNet) Spam may be down but malware marches merrily on. That's the message from the "November Threat Landscape Report" released yesterday by security vendor Fortinet.Global spam levels ultimately fell 12% in November after Dutch authorities took down a large Bredolab network made up of 140 different servers. The Bredolab botnet was typically used by cybercriminals to send out... Thu, 02 Dec 10 22:00:00 +0000 Keep Your E-Mail Private and Secure (Tony Bradley, PC World) E-mail is one of the most widely used forms of communication today. Estimates from May 2009 suggest that around 250 billion e-mails are sent every day. That equates to more than 2.8 million e-mail messages per second, and some of them are not even spam.E-mail is faster and cheaper than traditional postal mail, but at least when you seal that envelope and stick a stamp on it, you can have... Wed, 01 Dec 10 22:00:00 +0000 Survey: private cloud the choice of two out of five organizations (Joe McKendrick, ZDNet) Many in the industry don’t recognize the concept of “private cloud,” saying that it fails to meet the true definition of cloud, being a collection of resources across the Web. However, it looks like many companies are forging ahead with their own implementations of cloud for the benefit of employees and business partners.A new survey found that 29% of... Mon, 29 Nov 10 22:00:00 +0000 Top Ten Business Predictions for 2011 (Michael Friedenberg , ComputerWorld) It's the time of year for bold and brazen predictions, so here's a forecast of the Top 10 trends, priorities and events of 2011.10. Social media will keep dominating the business conversation.9. The CIO-CMO relationship will change for the better, growing closer and more collaborative.8. Cloud will move from an overhyped theory to an adopted practice in mainstream... Wed, 24 Nov 10 22:00:00 +0000 Encryption adoption driven by PCI, fear of cyberattacks (Ellen Messmer, NetworkWorld) A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards. According to the Ponemon Institute's "2010 Annual Study: U.S. Enterprise Encryption Trends," 69% of the 964 IT... Tue, 16 Nov 10 22:00:00 +0000 A hazy view of cloud security (Dave Kearns, Network World) More than three-quarters of the respondents in a recent survey couldn't say who they believe should be responsible for data housed in a cloud environment.A recent survey of 384 business managers from large enterprises revealed that confusion abounds about cloud data security. More than three-quarters of the respondents couldn't say who they believe should be responsible for... Sun, 07 Nov 10 22:00:00 +0000 Email is top cloud application in Europe (Maxwell Cooter, TechWorld) European cloud users see email as the first technology to be ported to the cloud, in stark contrast to North Americans who see software testing as the main reason to go down the cloud route. Furthermore, European companies are giving a massive thumbs-up to cloud with 70% of IT execs agreeing that "cloud services are becoming more important to organizations as solutions to... Thu, 04 Nov 10 22:00:00 +0000 People feel safer on a PC than on a mobile device (Lance Whitney, CNet) A majority 87% of people polled for a new study think their home PCs offer better defense against viruses, malware, and hackers than do their mobile phones. Released today by the National Cyber Security Alliance and Symantec, the study also discovered that people may be overconfident in the power of their computers to protect them as less than half are using full security software.Though only... Mon, 01 Nov 10 22:00:00 +0000 Gartner's top 10 technologies for 2011 (Larry Dignan, TechRepublic) Gartner on Tuesday outlined the 10 technologies it thinks will give technology execs the most bang for their budgets in 2011. How many of these technologies will be a true hit?Here’s Gartner’s 2011 list:1. Cloud computing2. Mobile apps and media tablets3. Next-gen analytics4. Social analytics5. Social communication and collaboration6. Video7. Context-aware... Wed, 20 Oct 10 21:00:00 +0000