This brief paper considers the main issues in the area of IT security, focusing on the relevant legal concerns and possible consequences arising from neglecting to carry out formal assessments. Read on to protect your company from breaches and risk.
Learn more about the current spam threat and the key ways it has mutated over the last two years. Read on to discover a different kind of anti-spam solution which is proving more than a match for today's spammers.
The commercial risks and legal issues surrounding email use by employees can create significant problems for employers. This paper considers the law and best practice concerning employee use, retention and storage of emails. Read on.
This white paper looks at the value of e-mail and outlines the issues and concerns of IT managers involved in managing and maintaining business critical e-mails systems. Keep your company's communications up and running - read more now.
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Read on to discover how internet security can give your business a competitive advantage.
For the IT Manager detailed to plan and implement an email security strategy, choosing a ‘budget’ option can ostensibly tick a lot of boxes. But how low-cost and easy to manage do these solutions actually prove to be? How does the headline cost compare with the experience they deliver? Read on to find out more.
Driving and exploiting the development of new interactive technologies, Gen Y expects on-demand web access and readily shares information at the click of a mouse button. This has brought both new opportunities and new risks to businesses. Read more.
Unsolicited email, or ‘spam’, is the most common internet-borne threat facing your organisation. One of the main tactics employed by spammers is the use of ‘news spam’ – emails pretending to offer information on breaking news stories or big events. Read on.
Your organisation may well have devised and implemented an Acceptable Use Policy (AUP) some time ago in order to guard against the risks of inappropriate use of computer systems by your workers, but are you confident that your AUP remains 'fit for purpose'? Read on to discover how you can enhance the effectiveness of your AUP.