Security Solutions Bring Your Own Device (BYOD) Security | You've probably sat in a meeting with your CIO or CFO and heard about the business benefits of the "Consumerization of IT." Advocates for this practice, also known as Bring Your Own Device (BYOD), say that workers are more productive when using devices with which they're more comfortable. Proponents also say that real cost savings can result from allowing users to connect their own devices to the corporate network, by eliminating the need to buy cell phones and tablets for each user and by reducing calls to IT Help desks as people use familiar devices. Managers might believe that employees who use their own personal devices to connect to corporate email systems, websites, and document management systems are more likely to be available outside of normal business hours and thus to work more than their colleagues. Read More... | ADVERTISEMENT Innovative Ways to Improve Software Quality & Development Agility Technologies that could help your company enable continuous integration testing of heterogeneous environments. Check out this brief webcast today! | Security News and Features For most organizations, a healthy security stance is essential to protecting and preserving Microsoft SharePoint content. Depending on your industry, you might even be bound by regulations that require you to secure and audit access to some content. Certainly, security is a broad topic that involves not only SharePoint farm administrators, but server, network, and database admins as well. Through delegation to site collection admins and site owners in the business units, security also involves day-to-day end users. Read More... | A Quick Look at Exchange Forensics | The news lately has been full of stories about computer-based surveillance, espionage, and other topics seemingly right out of a Tom Clancy (or John Le Carré) novel. I refuse on principle to use the "cyber-" prefix to refer to these topics (look up the Wikipedia definition of "cybernetics" and you'll see why), but if you recognize the words "Flamer", "Stuxnet", or "CISA" you'll know exactly what I'm talking about. Read More... | Give and Take Q: Can I turn off UAC to get rid of all the UAC prompting dialog boxes? | A: Yes, you can turn off User Account Control (UAC), but I don't recommend you to do so because it weakens the overall security posture of your Windows system by giving more opportunities for malware to get installed and do harm on your system. Read More... | Share your security-related tips, comments, or problems and solutions. Email your contributions to r2r@windowsitpro.com. If we print your submission, you'll get $100. We edit submissions for style, grammar, and length. | Additional Resources | |
|