Skip to main content

Security Essentials for IT Professionals Articles

back
Show titles with any search term.
  • Maintenance and Monitoring

    • The compromise of an administrative account represents two major risks unless specific steps are taken. The first risk, of course, is access to all data and resources on the compromised system....
    • Encryption is the process of scrambling data to make it unreadable to anyone who does not possess the proper key to unscramble it. This can be a powerful tool for enhancing data security but it...
    • In certain settings, e-mail software can store some or all electronic mail in files on your computer. This speeds access to e-mail, reduces the workload on mail servers, and allows you limited...
    • Some jobs are far more likely to access and store confidential data than others. Knowing which ones can help you prioritize data cleanup. Important: Regardless of their role, people who...
    • The standard confidential data scan scenario is one person scanning one computer that contains one hard disk. In that case, the search and remediation process is straightforward, with few...