Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

Case Study: Protecting sensitive information in transit

Encrypted USB devices from MXI Security

Case Study: College gets the NAC of wireless security

Multi-tier access handles different users' needs

Developing a plan for network security

Tips for creating a network security policy.

Planning for NAC

The challenges and the alternatives.

Hunt down a wireless device that is MAC spoofing

Location and identification are tricky

Securing a RADIUS server

What measures are there to help secure a RADIUS server?

Network mapping for NAC implementation

A comprehensive network inventory is necessary for NAC implementation, and can be full of surprises.

Use 802.1X on a small wireless network

There are ways to do it if you really want.

Virtual recovery to the rescue

Using virtualisation to protect multiple production applications with one disaster recovery server

Case Study: Protecting your data centre during power-outage season

Overhead lines pose risk in rough weather, but they're better than you think

Virtual recovery to the rescue

VMs can help build disaster recovery and high availability solutions

Keep Wi-Fi rogues under control

Without shutting down Starbucks hotspots.

Blocking off inappropriate websites

Whether it's kids - or adults.

Case Study: College gets the NAC

NAC saves Wisconsin college time and admin headaches.

Case Study: Data loss prevention takes a catch

A new DLP tool paid for itself within days.

IDS on the cheap

Building an inexpensive but powerful intrusion-detection system.

Limiting what contractors can do on the network

Contractors represent a unique security challenge.

Use PEAP for wireless authentication

Getting your security protocol set up right.

Case Study: Medics get net access control

ConSentry gear controls net access for hospital.

Lock down your servers

What's best - ACLs or a firewall?

Case Study: Police build mesh wireless network

Build carefully when lives are at stake.

Use 802.1X to prevent rogue access points

Port-based authentication works - but there are problems.

Secure FTP needn't be expensive

Open source fits the bill.

Backing up Microsoft Outlook

That old email might come in handy one day.

How to avoid phone viruses

What's out there and how to stop it.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map