Email Alerts
-
Microsoft security check: Is a Redmond Internet health check viable?
While it would be nice to check every computer for malware before allowing it on the Internet, expert Nick Lewis details why this is problematic. Answer
-
Can home PCs provide a way for viruses and spyware to enter a corporate LAN?
When considering allowing remote access to a corporate LAN, security concerns are paramount, especially when corporate security pros have no control over the home PCs. Learn how to protect the corporate LAN from viruses and spyware. Ask the Expert
-
What are the security risks of opening all the ports on an internal router?
Opening all ports between an internal employee network and a lab network is generally low-risk, though there are some things to look out for, says network security expert Mike Chapple in his response. Ask the Expert
-
Is it possible to identify a fake wireless access point?
A network's identity is easy to fake. If you're looking for proof of a valid access point, Mike Chapple reveals some secure wireless options. Ask the Expert
-
What to consider when deploying NAC products
There have been some network access control (NAC) success stories, but there has also been a fair share of NAC frustrations and deployment issues. In this expert Q&A, Mike Chapple has questions you should consider before implementing NAC products. Ask the Expert
-
What is WiPhishing?
In this expert Q&A, information security threats expert Ed Skoudis addresses WiPhishing and the reasons you shouldn't trust every wireless access point. Ask the Expert
-
Protecting your network from visitors
We get visitors at our facilities that tend to bring their own laptops with them. We would like to figure out a way to scan those laptops for pests, viruses, etc. before putting them on our network. Some of these offices are remote. We have Cisco 260... Ask the Expert
-
Designing an architecture for FTP file transfer
Ask the Expert
-
Setting a policy for laptop screensaver timeouts
Ask the Expert
-
Suggestions for multi-product virus protection
Ask the Expert
Security Management Strategies for the CIO