Email Brand Protection is not a new topic to 24x7itconnection.com. We have covered almost everything your organization needs to know to protect its email brand through our post about DMARC and DKIM. To reiterate, email brand protection is covering you from the brand abuse in emails outside of your organization that you cannot see. These […]
The Rise of the VMware vSphere HTML5 Client
If you’re a VMware administrator, chances are you’ve come to know and love the VMware vSphere C# client, often referred to as the thick client. For many, it is still the go to option, even with the introduction of the vSphere Web Client. Times are changing, and so is the way we’re going to mange […]
Cloud Security Starts With You
By now, we are all used to hearing about the latest security breach some company has fallen victim to. Sony, Target, Anthem, all are household names who have fallen victim and had data stolen. In some cases, innocent customers of these companies have been the ones impacted, and are at higher risk for identity theft since so much of their private information has found its […]
Should the SMB Secure Employee Mobile Devices through MDM?
Having some way to manage the security of mobile devices is crucial for Enterprise environments. If mobile phone and tablets are provided by the organization, having a tool to manage this ‘fleet’ is just as important as the tools you use to manage your desktops. After starting out with application provisioning and enforcing PIN numbers, […]
CoreOS Announces 1.0 Release of Rocket
Recently, CoreOS, the creators of a streamlined Linux distribution with running containers in mind, announced the 1.0 release of Rocket (rkt), their home grown container runtime environment. CoreOS was initially released in October of 2013, and has seen a massive adoption rate in a little over two years. The fact that this company and distribution […]
OpenSSH a Little too Open Thanks to New Vulnerability
OpenSSH is regarded as the most widely used SSH library, and would rival for top adopted open source products with significant numbers of enterprise vendors wrapping it into their network and security products. It wasn’t that long ago that we saw the release of CVE-2014-0160 which is more well known as the Heartbleed vulnerability or the OpenSSL […]
Windows 10: Yep, So Far, So Good
Last week Windows 10 was released and for the first time since the upgrade from Windows 95 to Windows 98 I actually ran through an operating system upgrade. That previous upgrade path was not a great experience in case you were wondering, but the past is in the past. If you are running Windows 7 […]
Internet of Things, Impact and Security
Back in February I covered some of my early thoughts on the Internet of Things (IOT). Several months later I still find myself following the concepts and considerations behind this technology. There are many industries that expect to benefit from IOT, and as long as we can secure our connections this has the potential to […]
Selfie Alert! Don’t Give Away your Location Details when Posting those Fun Photos
by Phoummala Schmitt We have all heard about the leaked celebrity nude photos being hacked from iCloud accounts this past year. Rumors of spying by the NSA. Security breaches at major corporations such as Sony, Anthem and Home Depot. All this has brought more attention to security and privacy, especially with regards to the technologies […]
The Basics of Exchange Security Strategies
By Theresa Miller Security is of constant issue when it comes to email. If you are new to the world of managing an Exchange environment, this article will help you discover some of the key security considerations for your new job. Organizationally and personally our devices are always at risk for hacking, phishing attempts, malware […]