5 Free Office Suites
Whether you're on Linux, Windows, or Mac, you can try these Open Source and free Office suites. Here we highlight their key pros and cons [Read more]
View ArticlePreventing Information Theft
What if an employee unknowingly tweets about a project you wanted to keep confidential? What if somebody puts up a negative blog post that impacts your organization's credibility? We delve into...
View ArticleJust How Secure is Your Organization?
Even after deploying the latest security solutions, most CIOs find it difficult to determine the exact health of security in their organization. Here, we provide an easy to follow approach that helps...
View ArticleCombating Email Threats
Are you sure your anti-virus solution is enough to secure your system your email threats? Check whether your email system is vulnerable to email viruses, worms and other threats. Here we discuss...
View ArticleBeef Up Your Website's Security
Learn about the most common attacks that are being subjected to web 2.0 enabled websites today and the measures to combat them [Read more]
View ArticleBusiness Logic Attacks: What Every Web Developer Needs to Know
Hackers are finding newer ways of attacking web apps, with the latest being to attack the business logic. Here's what developers and security specialists need to know to take counter-measures [Read more]
View ArticleIs Your Smartphone Secure?
You use your smartphone for corporate communications, accessing organization's business apps and even for banking, but did you ever wonder how safe your phone's data is from bots or when it gets lost?...
View ArticleEncrypting Data on Hard Disks
You may not always be able to prevent your hard disk from theft or getting accessed by a third person but you can surely encrypt it to prevent important information from getting stolen [Read more]
View ArticlePrevent Data Theft from USB Ports
The convenience of attaching a storage device to a USB port can be mis-used in an organization to steal data. We talk of various ways to control USB ports on systems. [Read more]
View ArticleGraphics Card for Workstations
Consumer graphics cards can't be interchanged with professional ones in a graphics workstation. We delve into the differences between the two to help you choose the right one [Read more]
View ArticleEyeOS: Exploring the Powers of Cloud
Ever thought of running things via cloud? How about doing that from your own server, without any extra effort or cost? We take a look at eyeOS, a cloud OS built especially for enterprise usage [Read more]
View ArticleWindows InTune Desktop Management
Microsoft introduces a low cost and easy to manage cloud-based solution to remotely manage your office desktops fleet, keeping them secure and updated. [Read more]
View ArticleSecurity Threats from Social Media
Social media platforms can cause a lot of information leak from organizations. Through this article we discuss some key steps that can act as a guard against it [Read more]
View ArticleOnline Office Suites: Can you Really Shift?
While benefits like anytime, anywhere access, no local storage, etc are certainly appealing, lack of advanced features, and the need to improve your bandwidth quantity and quality go against it. Read...
View ArticleOffice Suite on the Cloud? Not Yet
A CIO explains why he's not adding online office suites to the cloud apps deployed in his mid-sized business [Read more]
View ArticleBI: Freedom From Excel Sheets
Business apps like ERP and CRM help automate your business processes, but they work in their own silos. A BI tool can help consolidate data from multiple business apps to help you take the right...
View ArticleComparing Online Office Suites
We tested Google docs, Zoho Office, and Think Free Office. Here's our take. [Read more]
View ArticleJust How Secure is your Organization?
We covered compliance and vulnerability indices in the first part of this series. Now, we'll conclude the series by telling you about the remaining methods of measuring the security of your...
View ArticleCloud Migration: An Incremental Approach
An incremental approach to cloud migration can enable organizations to cloud-enable IT assets in a manner that maximizes the value to the organization without interrupting the business. Read on to know...
View ArticleSecuring a Joomla Website
We take a look at some key features that should be incorporated within your code, to improve the security of a Joomla-based website [Read more]
View Article