Safe@Office 1000N provides easy network protection for SMBs

It's hard to miss a Check Point appliance, because they all have bright orange boxes and bright yellow front panels. The 1000N is no exception, and the small metal box with the gaudy

Published on: August 10th, 2010 James E. Gaskin

Complete buyer’s bible for secure remote access

It always seems to happen. You finally take a couple of days off from work and head to the beach for some sun and sand. Inevitably, someone needs a piece of information only

Published on: May 18th, 2010 Keith Schultz

Scouts Canada turns to e-learning to train thousands of new volunteers

For an extra-curricular activity that teaches young boys how to sew and examines proper uniform protocol in empty church basements on weeknights, Scouts Canada is pretty innovative. The organization has been driven by

Published on: November 6th, 2009 Brian Jackson

Iran government fights losing battle to muzzle Internet protests

Iran's government in recent days has tried to cut off Internet access for most of its election protesters by shutting down routers at the nation's perimeters, ripping satellite dishes off roofs, cutting cables

Published on: June 18th, 2009 Patrick Thibodeau

Security software – to use it or to lose it? That’s the debate

As the Conficker worm sprang to life on April 1, talk here at the PC World offices turned to some interesting debates about how best to protect PCs from malware threats. In recent

Published on: April 21st, 2009 Rick Broida and Robert Vamosi

Google Apps can now connect with corporate data

Google's new Secure Data Connector could result in a plethora of tie-ups between its productivity software and a range of enterprise applications and data sources.The SDC, announced late Tuesday evening, allows data from

Published on: April 9th, 2009 Chris Kanaracus

Seven ways to super-size your IT department

Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some

Published on: November 18th, 2008 David Strom

The top five mistakes security experts would make again.

Ten years ago, Michael Riva was network administrator for a top-five American consultancy. Employees were downloading graphic pictures and videos onto the network. Riva told his boss a proxy server with content filtering

Published on: September 30th, 2008 Bill Brenner

Financial group uses next-generation firewall as data security vault

Western & Southern Financial Group had what it considered defense in depth for its IP network but recognized that there were still ways that sensitive data might leave the network undetected, so it

Published on: May 9th, 2008 Tim Greene

The best free software and services on the Web

It's the F-word that always gets people's attention. And whether it's to enhance your office systems or just keep you busy during down time, the Web, it would seem, has the answer to

Published on: March 12th, 2008 Diya Koshy, John Maringmei and Kailas Shastry

Microsoft Windows Live OneCare 2.0 – Simple, solid, inexpensive

The security protection of Microsoft's Windows Live OneCare 2.0 suite is much better than that of the debut version we reviewed more than a year and a half ago. Add to that a

Published on: February 4th, 2008 Narasu Rebbapragada

WebRoot AV – First rate protection at a reasonable price

In today's Internet world, protecting end-user PCs from the unknown is one of the most important things you can do. No matter how a system is compromised -- be it a virus or

Published on: January 9th, 2008 Keith Schultz

Seven surefire strategies to block network attacks

While network attacks are expected to rise in 2008, security experts say small Canadian businesses can protect themselves by implementing seven practical steps."Protection is not always an expensive proposition," said Marc Fossi, manager

Published on: November 29th, 2007 Nestor Arellano

IBM/ISS Proventia MX5010 has high IPS catch rate

The Proventia MX5010 is an amazingly fast Internet Protocol Security (IPS) which outclassed the competition when it came to detecting the attacks we threw at it. Unfortunately, that world-class IPS is housed in

Published on: November 9th, 2007 Joel Snyder