Computer Security: The First Step
The easiest route hackers can take is through employees. The natural reaction of an information-technology department to easy-to-crack passwords and log-ons taped to monitors is
The easiest route hackers can take is through employees. The natural reaction of an information-technology department to easy-to-crack passwords and log-ons taped to monitors is
Information-technology managers usually focus on software licenses and maintenance. What about electricity for power, emergency backup and cooling? Consumption per unit of computing power is
With servers, the norm has been: any application likely to run constantly, such as Microsoft SQL Server or Oracle, requires its own processor. As a
So your current data center just doesn’t cut it anymore. What should you budget for a move to one that can meet your needs? Allow
Running phone calls over an Internet Protocol network can save money by reducing per-call fees and taxes. But security considerations can eat into your savingsor
M. Angela Sasse, a professor at University College London who specializes in security, recommends top-to-bottom training in an information-technology department—and higher in the organization. “There