Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.
Steps for Establishing VoIP To achieve convergence, companies can purchase an on-premise Internet protocol enabled phone system (IP PBX). Or they can lease a hosted Internet protocol Centrex service (similar to traditional Centrex, but IP-enabled) through which telecom equipment is housed by the supplier and features are delivered remotely. Hosted telecom services are gaining in… Read More »
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security… Read More »
Study from the Small Business Technology Institute and Symantec reveals that more than half of small businesses have experienced at least one security incident in the past year. The study titled “Small Business Information Security Readiness” confirms that small business are increasingly vulnerable to attack and urges the adoption of security technology to protect information… Read More »
Following right of Microsoft’s purchase of nonexclusive rights to Finjan’s source code, Microsoft announced its intention to acquire FrontBridge Technologies, a company specializing in providing secure managed messaging solutions and services.
Suddenly IT security has got far more complex. After all, a few years ago we were mostly worrying about spam. Now we can’t be sure what is going to hit us next after recent outbreaks of phishing, pharming and spyware.
Security firm Secunia reported Tuesday that a high-risk security vulnerability affects Symantec’s products, across both Windows and Macintosh platforms. The vulnerability could allow hackers to take control of a system remotely.
Compliance, Regulation and Statutory Legislation have become increasing burdens for the long-term storage of data. Legislation operates in tandem with a fierce economic climate that is keeping a tight grip on budgets and is dictating that IT operates with fewer skilled resources, whilst demands for service intensify. It is clear that a way must be… Read More »
Some facts on cyber threats from Symantec Corp.´s regular security updates. North American computers are the source of more than half the spam worldwide, most of it related to commercial products such as porn, cut-rate drugs and financial services.
A Santa Claus worm is attempting to trick instant messaging users into clicking on a file that delivers unwanted software to user’s computer. Victims who click on the file see an image of Santa, but what they are less likely to notice is a so-called rootkit payload being installed onto their system.