Quantcast
Channel: Implementation - Advice - PCQUEST
Browsing all 44 articles
Browse latest View live

5 Free Office Suites

Whether you're on Linux, Windows, or Mac, you can try these Open Source and free Office suites. Here we highlight their key pros and cons [Read more]

View Article



Preventing Information Theft

What if an employee unknowingly tweets about a project you wanted to keep confidential? What if somebody puts up a negative blog post that impacts your organization's credibility? We delve into...

View Article

Just How Secure is Your Organization?

Even after deploying the latest security solutions, most CIOs find it difficult to determine the exact health of security in their organization. Here, we provide an easy to follow approach that helps...

View Article

Combating Email Threats

Are you sure your anti-virus solution is enough to secure your system your email threats? Check whether your email system is vulnerable to email viruses, worms and other threats. Here we discuss...

View Article

Beef Up Your Website's Security

Learn about the most common attacks that are being subjected to web 2.0 enabled websites today and the measures to combat them [Read more]

View Article


Business Logic Attacks: What Every Web Developer Needs to Know

Hackers are finding newer ways of attacking web apps, with the latest being to attack the business logic. Here's what developers and security specialists need to know to take counter-measures [Read more]

View Article

Is Your Smartphone Secure?

You use your smartphone for corporate communications, accessing organization's business apps and even for banking, but did you ever wonder how safe your phone's data is from bots or when it gets lost?...

View Article

Encrypting Data on Hard Disks

You may not always be able to prevent your hard disk from theft or getting accessed by a third person but you can surely encrypt it to prevent important information from getting stolen [Read more]

View Article


Prevent Data Theft from USB Ports

The convenience of attaching a storage device to a USB port can be mis-used in an organization to steal data. We talk of various ways to control USB ports on systems. [Read more]

View Article


Graphics Card for Workstations

Consumer graphics cards can't be interchanged with professional ones in a graphics workstation. We delve into the differences between the two to help you choose the right one [Read more]

View Article

EyeOS: Exploring the Powers of Cloud

Ever thought of running things via cloud? How about doing that from your own server, without any extra effort or cost? We take a look at eyeOS, a cloud OS built especially for enterprise usage [Read more]

View Article

Windows InTune Desktop Management

Microsoft introduces a low cost and easy to manage cloud-based solution to remotely manage your office desktops fleet, keeping them secure and updated. [Read more]

View Article

Security Threats from Social Media

Social media platforms can cause a lot of information leak from organizations. Through this article we discuss some key steps that can act as a guard against it [Read more]

View Article


Online Office Suites: Can you Really Shift?

While benefits like anytime, anywhere access, no local storage, etc are certainly appealing, lack of advanced features, and the need to improve your bandwidth quantity and quality go against it. Read...

View Article

Office Suite on the Cloud? Not Yet

A CIO explains why he's not adding online office suites to the cloud apps deployed in his mid-sized business [Read more]

View Article


BI: Freedom From Excel Sheets

Business apps like ERP and CRM help automate your business processes, but they work in their own silos. A BI tool can help consolidate data from multiple business apps to help you take the right...

View Article

Comparing Online Office Suites

We tested Google docs, Zoho Office, and Think Free Office. Here's our take. [Read more]

View Article


Just How Secure is your Organization?

We covered compliance and vulnerability indices in the first part of this series. Now, we'll conclude the series by telling you about the remaining methods of measuring the security of your...

View Article

Cloud Migration: An Incremental Approach

An incremental approach to cloud migration can enable organizations to cloud-enable IT assets in a manner that maximizes the value to the organization without interrupting the business. Read on to know...

View Article

Securing a Joomla Website

We take a look at some key features that should be incorporated within your code, to improve the security of a Joomla-based website [Read more]

View Article
Browsing all 44 articles
Browse latest View live


Latest Images