Tips
Tips
-
Your enterprise wireless LAN questions answered
Got wireless LAN questions? Our expert has solutions to 802.11n migration, wireless LAN troubleshooting and mesh network design. Continue Reading
-
VMware snapshot best practices
Expert insights to help organizations ensure efficient VMware virtual machine snapshot mechanisms. Continue Reading
-
Implement job rotation for team motivation, productivity
Indian CXOs are increasingly experimenting with job rotation for team motivation and productivity. Find out why job rotation helps, and how M&M practices it. Continue Reading
-
5 non-monetary rewards for your IT teams
Non-monetary rewards are an effective way to motivate employees. Learn five non-monetary rewards that CIOs can make use of to motivate their teams. Continue Reading
-
Data champion: Decoding role and responsibilities
Data champion is the new buzz word. As companies invest in BI and DW, a data champion is becoming important to ensure returns on these investments. Continue Reading
-
Secure SDLC best practices
While focus on technicalities is a given during the SDLC, this tip explains how to secure the SDLC, from the analysis phase right through to deployment. Continue Reading
-
Tier 3 data center design: The cooling checklist
Our expert gives insights into data center cooling system considerations that will ensure adherence to tier 3 data center standards. Continue Reading
-
Identity and access management (IAM) program implementation guidelines
The first part of this identity and access management (IAM) program guide details how to optimally structure the implementation’s foundation. Continue Reading
-
Botnet detection through DNS behavior and clustering analysis
Botnets are fast emerging as one of the most serious threats to Internet security today. This expert tip looks at how botnets can be detected analyzing their unique fast flux characteristics. Continue Reading
-
Cloud disaster recovery services vs. traditional DR: A weigh-in
Do cloud disaster recovery services’ benefits outweigh those of traditional DR? An expert weighs the viability of these disaster recovery approaches. Continue Reading
-
5 data mining techniques for optimal results
Faulty data mining makes seeking of decisive information akin to finding a needle in a haystack. Here are some tips to tweak your data mining exercises. Continue Reading
-
Advanced Wireshark tutorial: Packet and network security analysis
This Wireshark tutorial will familiarize you with Wireshark’s advanced features, such as analyzing packets and undertaking packet level security analysis. Continue Reading
-
Mature data loss prevention: 8 questions to ask your vendor
To determine if a data loss prevention (DLP) solution truly meet your organization’s needs, there are certain clarifications you always require. Continue Reading
-
How to stop a DDoS attack after initiation
In this expert response, Nick Lewis explains how to stop a DDoS attack after it has been initiated. Continue Reading
-
Collaboration tools: 6 aspects to consider during evaluation
Collaboration tools can help companies enhance their business applications and improve productivity. Consider these factors while evaluating collaboration tools. Continue Reading
-
Shodan search engine for penetration tests: How-to
A very handy yet simple to use VA/PT tool, Shodan can be of great use to ethical hackers. Here’s a quick Shodan tutorial. Continue Reading
-
Top 7 anti rootkit software for Windows
It can be quite a tough task to kick out rootkits from infected Windows systems. Our list of top anti rootkit software will prove handy. Continue Reading
-
Server sizing considerations for virtual environments
Right sizing physical server capacities is the key to a successful server virtualization deployment. An expert lists down key server sizing lookouts. Continue Reading
-
Tier 3 data center specifications checklist
Getting a data center tier 3 certified translates to high uptimes. An accredited tier designer shares insights to meet tier 3 data center specifications. Continue Reading
-
PCI DSS compliance checklist for virtualized environments
A comprehensive Payment Card Industry Data Security Standard (PCI DSS) compliance checklist for protection of cardholder data in virtual environments. Continue Reading
-
Test data deduplication tools with these five guidelines
Here is a list of five critical aspects to reflect on while testing data deduplication tools for actual results after your rollout. Continue Reading
-
Employee information awareness training: PCI policy templates
To comply with PCI DSS -- and keep cardholder data secure -- organisations must train their employees on data handling best practices. This tip explains how. Continue Reading
-
10 identity and access management (IAM) implementation mistakes
An overview of the common issues organizations overlook while deploying an identity and access management (IAM) solution. Continue Reading
-
IFRS implementation in India: Steps to follow
After analyzing the impact on IT, IFRS implementation in India involves three key stages. This tip details the three steps to enable a smooth IFRS implementation process. Continue Reading
-
Crack CISSP exam with these tips
Here are some guidelines to help you sail through the Certified Information Systems Security Professional (CISSP) exam and obtain the CISSP certification. Continue Reading
-
Thin provisioning best practices for virtual server environments
This tip emphasizes on the key factors to consider while provisioning thin storage for virtual server environments. Continue Reading
-
ETL tool buying guide
While procuring an extract, transform, and load (ETL) tool, your considerations should range from data formats, profiling, data quality to meta data support and more. Continue Reading
-
Ensure data quality management during integration
Data quality management is the first and crucial step to data integration. Here are some tips to help maintain the data quality in your organization. Continue Reading
-
Seven social media security best practices
This tip aims to highlight seven crucial factors to be considered while devising a strategy for optimal social media security. Continue Reading
-
Top seven social media threats
Discover the top seven social media threats in the first of a two-part series on social media related security threats and preventive measures. Continue Reading
-
Include penalty clauses for assured service level
Penalty clauses in a service contract not only act as deterrents but also help in ensuring vendor accountability. These clauses help in pulling up the vendors in case of service failures through a scheme of penalties. Continue Reading
-
Exit clause in SLAs: 7 key pointers
An exit clause is a useful tool to close a deal when any agreed and important terms of a service contract are dishonored. Here are seven points to include in an exit clause. Continue Reading
-
10 security incident management best practices
Here’s a quick tip on the security incident management processes an organization should adopt to combat the current dynamic threat scenario. Continue Reading
-
5 virtual server management considerations in production environments
Server virtualization can create complexities such as virtual server management. These quick tips will help you better handle virtual server management. Continue Reading
-
Essential ingredients for ISMS implementation success
Information security management system (ISMS) efficiency hinges on three critical factors—design, implementation, and maintenance. How can you ensure these? Continue Reading
-
Mean time between failure vs. load/unload cycles
Mean time between failure, the traditional metric used to predict the life of a disk drive, is being challenged by counts of load/unload cycles and annualized failure rates. Continue Reading
-
7 steps to secure unstructured data
Unstructured data can cause information leaks of dire consequences. Here are a few ways to secure unstructured data from theft and corporate espionage. Continue Reading
-
Effective Web application security risk assessment in 12 steps
In the first part of this tip, we explore six of the 12 crucial components required to conduct a satisfactory Web application security assessment. Continue Reading
-
How to detect hacking with a Microsoft file integrity checker
Most attackers these days aren't interested in bringing down day-to-day operations, but rather in infiltrating corporate networks and staying there without being seen. In this tip, learn how to detect such stealthy attacks with a file integrity ... Continue Reading
-
Investigate fraud with these best practices
Fraud by its very nature cannot be eliminated, but only contained. Here are guiding principles to investigate fraud after an incident has been reported. Continue Reading
-
How to use the Microsoft FCIV command-line checksum tool
Downloading files from the Internet always poses a risk, but there are strategies that can make the process more secure. In this tip, Michael Cobb explains how to use the Microsoft FCIV tool to check the hash values of downloaded files and create ... Continue Reading
-
Implementing BS 25999 standard for BCP
BS 25999 standard forms an essential part of implementing BCP. Let’s get a quick insight on the BS 25999 standard and its components. Continue Reading
-
Implement self-service BI with this 8 step model
Incorporate self-service business intelligence (BI) with these tips to empower democratization of data and make it rapidly available for business users. Continue Reading
-
Preparing for ISO 27001 audit
We highlight a few initiatives to sail through the ISO 27001 audit, after the information security management system (ISMS) framework has been implemented. Continue Reading
-
Guidelines for successful ERP implementation
The job is only half done after evaluating an enterprise resource planning (ERP) vendor. Here are a few essential tips for a successful ERP implementation. Continue Reading
-
Return on security investments: Measurement guidelines
Measuring the return on security investment can be quite a challenge. We highlight a few methods to streamline this task. Continue Reading
-
Corporate penetration testing: Best practices for thorough assessments
Many companies are unprepared going into a penetration test, and thus spend unnecessary time and money on the testing. Learn how to get best value out of penetration tests performed on your critical infrastructure and services. Continue Reading
-
Ten tips to improve SCADA security
Stuxnet and the Victorian Auditor General have both put SCADA security on the agenda. We offer some insight into how to protect your systems in this story. Continue Reading
-
Implementation of BI: Useful guidelines for effective execution
Proper implementation of a business intelligence (BI) project results in numerous advantages. Here are a few tips for successful execution. Continue Reading
-
Software testing strategy for protection of real data
How do you devise a software testing strategy that secures real data used in testing and development environments? Our expert has powerful guidelines. Continue Reading
-
Four DLP implementation best practices from ISACA
Under its new whitepaper ‘Data Leak Prevention’, ISACA enumerates its detailed guidelines for DLP implementation. Continue Reading
-
Demystifying PKI technology based two factor authentication
PKI technology provides one of the most useful (yet complex) two factor authentication mechanisms. Here are some PKI evaluation and implementation tips. Continue Reading
-
ATM security – The dos and don’ts
An ATM is one of the common points of financial frauds. Our expert outlines ATM security aspects that banks and customers need to take care of. Continue Reading
-
E-waste management: Easy steps to snip e-waste piles
As e-waste becomes a grave environmental threat, here are a few steps which will ensure companies facing e-waste issues take the right direction. Continue Reading
-
Private cloud implementations: Demystifying the set up process
Organizations which have misgivings about public clouds can go in for the private cloud. Continue Reading
-
IFRS compliance guide for the Indian CIO
As Indian companies plan ahead for IFRS compliance, it becomes imperative that CIOs grasp the basics of these accounting standards. Here’s a quick overview. Continue Reading
-
Microsoft security tools: MBSA and MSAT explained
Regular security assessments are crucial, but can be costly. In this tip, Michael Cobb explains how to use the Microsoft Baseline Security Analyzer and the Microsoft Security Assessment Tool for a thorough and free network and risk audit. Continue Reading
-
5 penetration test tools to secure your network
Selecting the right penetration test tool can be a hassle. To make your life easier, we have put together a list of proven penetration testing tools. Continue Reading
-
Applications upgrade guidelines for your organization
Every applications upgrade involves business needs and user accessibility. So how does one know when it is time to go in for an upgrade? Continue Reading
-
Six business continuity management (BCM) lifecycle guidelines
Presenting six steps that you cannot afford to ignore while drafting an effective business continuity management lifecycle. Continue Reading
-
Man in the middle attack prevention strategies
"Active eavesdropping" is the best way to describe a man in the middle (MITM) attack. We take a look at MITM attacks, along with protective measures. Continue Reading
-
Six things a data center operations manager shouldn't do
A data center operations manager has a tough job, as the experienced will readily admit—a not-to-do list for the person that every data center depends on. Continue Reading
-
Software security requirements : A secure SDLC's critical component
Clarity about software security requirements is the foundation of secure development. These tips to assess software security requirements are a good start. Continue Reading
-
A plan for crisis communication : Need of the hour
Plans should be in place for communicating with employees in the event of a disaster. An effective plan for crisis communication is critical to this end. Continue Reading
-
Planning BCP approaches: Stages and guidelines
Special skillsets are crucial when you get into planning BCP processes for your organization. Here are a few useful tips. Continue Reading
-
How two-factor authentication and layered authentication differ
Learn how two-factor authentication and layered authentication differ and whether there a difference in the deployment and implementation of these two systems. Continue Reading
-
DLP solutions: Evaluation tips and more
Certain things need to be kept in mind while evaluating DLP solutions. Here's a detailed overview. Continue Reading
-
Capex to opex conversion of IT investments
CIOs can present IT expenditure in a new light once they manage to convert these spends from being capex to opex items. A closer look. Continue Reading
-
Prevent data leakage with secure media reuse policies
Media reuse is a fact of life for most organisations. But if not handled properly, it can create a big security problem. Learn some media reuse techniques that will help to prevent data leakage. Continue Reading
-
Encryption of backup : Strategies for effectively securing your data
While much effort goes into security, the same data's backups are not so fortunate. Use these tips for effective encryption of backup data. Continue Reading
-
Software design and security: Useful guidelines
When it comes to software, security should start at the design stage. Here's what to look out for on the software design and security fronts. Continue Reading
-
Using Windows Server 2008 R2 group policy to make life easier
Windows Server 2008 R2's group policy can be quite beneficial. Here's a look at how you can get better utilization using Windows Server 2008 group policy. Continue Reading
-
ISO 27001 ISMS design tips for your organization
Crafting an ISO 27001 information security management system (ISMS) can be quite a challenge. Here are some ISO 27001 ISMS implementation pointers. Continue Reading
-
Using resource allocation management to prevent DoS and other attacks
Resource allocation management is an effective way to prevent denial-of-service (DoS) and other attacks. Find out how to allocate resources in order to increase the security of your organisation. Continue Reading
-
ISO 27001 certification: Preparation in four steps
Here's how to prepare your organization for ISO 27001 certification Continue Reading
-
Hyper-V backup mistakes to avoid
Virtualisation complicates the server backup process. Here are six VM backup mistakes you should avoid to eliminate headaches and reduce VM downtime when backing up Hyper-V. Continue Reading
-
Single sign-on (SSO) authentication can help prevent password fatigue
Michael Cobb reviews first steps for establishing a federated environment where users sign into a system once and are able to access multiple services controlled by third parties. Continue Reading
-
Increasing information security awareness in the enterprise
The recent attacks against Google and others have prompted several high-profile government agencies to advise against using Internet Explorer. Michael Cobb explains how increasing security awareness can help organisations avoid falling prey to a ... Continue Reading
-
Five registry keys to improve Windows 7 security
Learn about five Windows 7 registry keys that can improve your organisation's security by tuning PCs in ways that ensure users behave themselves! Continue Reading
-
Leveraging bulk software licensing deals
A bulk software licensing deal can be a good option, given the tight budgets. Here are some tips on how to leverage bulk software licensing deals. Continue Reading
-
Penalty clauses in an IT service contract: Extracting the most
It's easy to put penalty clauses in a service contract, but difficult to exercise them. These tips will help you get the most out of your penalty clauses. Continue Reading
-
Best practices for (small) botnets
Your enterprise might have a strategy to deal with a large-scale botnet attack, but how would you deal with a micro-botnet that knows how to bypass antivirus and firewalls? Get botnet help with this expert advice. Continue Reading
-
In-band storage virtualization pointers for your enterprise
Since in-band storage virtualization has its share of implementation issues, these pointers should come handy on the in-band storage virtualization front. Continue Reading
-
SQL injection detection tools and prevention strategies
SQL injection attacks are easy to learn, and they have been the cause of many of today's most notorious data breaches. Michael Cobb reveals measures you must take to protect your site from the SQL vulnerabilities that malicious attackers can easily ... Continue Reading
-
Performance metrics: Evaluating your data storage efficiency
Learn how performance metrics can evaluate the efficiency of your enterprise data storage resources in terms of capacity utilization, performance and data protection. Continue Reading
-
Cross-site scripting explained: How to prevent XSS attacks
Mike Cobb provides a comprehensive tip that offers everything you'll need to know about preventing XSS attacks. Continue Reading
-
Five tips for N+1 uninterruptible power supply (UPS) design
Critical infrastructure calls for redundancy in the form of N+1 uninterruptible power supply (UPS) systems. Here are some handy N+1 UPS design tips. Continue Reading
-
Eight free IT outsourcing templates
Get help structuring our next outsourcing deal with our link library of templates spelling out the best way to arrange SLAs and RFPs. Continue Reading
-
Project review tips for effective project management
IT project failures can be attributed to the lack of regular project reviews. Here are some tips to integrate project reviews in your project lifecycle. Continue Reading
-
Develop a unified communication security plan
Here is a handy guide to help you develop a comprehensive unified communication (UC) security strategy which covers UC infrastructure and applications. Continue Reading
-
Root cause analysis tips for optimal network management
Root cause analysis (RCA) has been around as a technology for a while, but it is gaining popularity of late due to increase in the number of managed devices in data centers. Continue Reading
-
SAN sizing: Get the right SAN for your needs
Storage area network sizing is an essential part of a SAN evaluation. Here are some SAN sizing tips to ensure a best-fit SAN solution for your organization. Continue Reading
-
Application security should be addressed in initial SDLC stages
Incorporate application security into your software development lifecycle with this step-by step approach. Continue Reading
-
The warranty side of software license and service agreements - Part I
Indian organizations can use the Indian legal system to resolve warranty disputes associated with software license and service agreements. In the first part of this column, Huzefa Tavawalla and Vivek Kathpalia of legal firm Nishith Desai Associates ... Continue Reading
-
DAS vs. NAS vs. SAN: Which is best for virtual storage?
DAS, NAS, and SAN can all do the job supporting virtual machines. But which works best? Find out in this article. Continue Reading
-
Configuring cluster failover settings for Hyper-V virtual machines
The Failover Cluster Management console can be confusing, but its benefits are worth some effort. The console can ensure that a highly available Hyper-V virtual machine fails over to the proper host. Continue Reading
-
How to use a netstat command in Windows to watch open ports
Mike Cobb shows how a simple command line tool can provide invaluable information about what's happening on your system Continue Reading
-
How to evaluate and purchase a SAN
The Royal Horticultural Society's network manager Martin Taylor guides users through the process of evaluating and purchasing a SAN. Continue Reading
-
The ten best ways to use solid state disk
Learn best practices for adopting solid state disk, a technology that works best when applied to I/O-intensive applications. Continue Reading
-
How to stop rogue DHCP server malware
Rogue DHCP server malware adds a new twist to an old idea ... but not so new that you cannot fight back, as explained in this story. Continue Reading