• What makes a fabric port change to a loop port?
  • How secure are extended validation SSL certificates?
  • What is the best choice for an enterprise Web browser?
  • What should happen to users and devices that fail NAC policies?
  • When is the right time to switch from tape to disk-based backup?
  • RAID 10 vs. RAID 1: Mirrored drives matter
  • Is data deduplication a good way to cut backup times from remote offices?
  • RAID 10: How many disk drives should you use?
  • Can replication and CDP replace a traditional backup regime?
  • How does search engine malware spread?
  • How do you defragment NAS?
  • When to use a unified threat management system
  • Cloud computing network security best practices
  • How to detect and remove Sinowal and repair a master boot record
  • Active-active array vs active-passive array: Storage arrays explained
  • How do you calculate the space available when you configure three disks of different capacity to RAI
  • What type of server would have the capacity to service an office of 50 people?
  • Can I monitor and manage a calculated RPO and RTO?
  • Do I need to intervene when manually updating apps replicated as part of a DR plan?
  • Should RAID 5 configurations include different disk volumes?
  • How effective are password hack tools?
  • PCI credit card compliance: Credit card data protection (over the phone)
  • What is a LUN and why do we need storage LUNs?
  • What are USB flash drive security best practices?
  • When IT security costs are cut, which security product is a must?
  • What considerations should be made when outsourcing IT infrastructure?
  • How do attackers use Google to hack?
  • How to protect employees' personal information and passwords
  • Are iPhone encryption features on the way?
  • Fibre Channel compared to FATA drives
  • What are best practices for credit cards in a call centre?
  • How to enable a local keyboard after an RDP connection
  • Why can Google block virus-infected websites; how do you stop a ban?
  • Should a worm patch or push security updates?
  • When running Wireshark, will adding a switch stop packet sniffing?
  • RAID 5 configuration: How to calculate disk space for data storage and parity storage
  • Can I use a PC server as a NAS device?
  • NAS Backup: What are my options?
  • When to capture packets with Wireshark
  • How to find and prevent SQL injection attack vulnerabilities
  • What should be part of an employee termination checklist?
  • Are there keylogger monitors that can effectively spot malware?
  • RAID 1 vs RAID 5: What are the pros and cons?
  • Can I connect datacentres 70km apart using DWDM?
  • Which RAID type is optimal for a Lotus Notes server? Also what is RAID-5E?
  • Managing offsite backup tape storage: How far away should tapes be stored?
  • How would you recover Exchange Server 2003 when the log file is corrupted?
  • What are the pros and cons of inline and post process data deduplication?
  • How can I replicate an Oracle database every five minutes between two servers each with RAID 5?
  • Agent-based and agentless replication - what are the pros and cons?
  • What storage media can compete with tape for long-term storage?
  • Off site backup suppliers - how do you choose the most suitable for your business?
  • Finding and fixing problems caused by vulnerability scanning
  • Token authentication vs. biometric authentication systems
  • What are the dangers of using Facebook, other social networking sites?
  • What are the key standards for business continuity that IT departments should be aware of and gainin
  • What are the advantages and applications of FCoE?
  • Regaining data from broken RAID-0+1array
  • Disk-based backup vs. tape
  • How to comply with the Data Protection Act of 1998
  • How to achieve laptop data security
  • Will implementing two-factor authentication satisfy FFIEC requirements?