What are some of the biggest software patching myths? or “I wont update my Windows…it take to long to do this!”

Desktop patch management is subject to its share of myths. I’m going to clear the fog around waiting on software patching and Windows XP security. Continue reading

Debunking cloud-hosted virtual desktop myths

The truth about cloud-hosted virtual desktops sometimes gets lost in all the hype: DaaS isn’t without downsides, and per-user licensing doesn’t make it easier for SMBs to jump in.
Continue reading

10 compelling reasons to upgrade (or not?) to Windows Server 2012

I’ve had a chance to play around a bit with the Datacenter version of Windows Server 2012. Some have been put off by the interface-formerly-known-as-Metro, but with more emphasis on Server Core and the Minimal Server Interface, the UI is unlikely to be a “make it or break it” issue for most of those who are deciding whether to upgrade. More important are the big changes and new capabilities that make Server 2012 better able to handle your network’s workloads and needs. That’s what has many IT pros excited.

Here are 10 reasons to give serious consideration to upgrading to Server 2012 sooner rather than later. Continue reading

Why continuing support for XP is bad math

Microsoft XP LogoMore than a few Windows XP users are willing to pay Microsoft for more updates to the now effectively obsolete OS.

In theory, doing so could produce billions in revenue for Microsoft. Here’s why it’s not going to happen. Continue reading

Why a User Access Control Policy is crucial for your organisation

Organisations spend a lot of time and effort protecting their networks from external attacks.

However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2013 Trust, Security & Passwords report.
To efficiently mitigate insider threats and reduce the attack surface of an Information System, a network must be set on a ‘need-to-know’ and ‘need-to-use’ basis.
In real terms, this means that IT departments must ensure that each user in their organisation can only log in according to the pre-authorisation that has been granted. Unfortunately, this is usually not the case. Continue reading

12 Excellent Cloud Computing Operating Systems

Cloud is not just a natural form of smoke. It is also the most hyped term in the IT industry right now. Everyone is talking about cloud and vendors all cloudify their products and service offerings. In the area of operating systems this is also happening and a cloud OS is simply a simplified operating system that runs just a web browser (at least that is one definition of it), providing access to a variety of web-based applications that allow the user to perform many simple tasks without booting a full-scale operating system. Because of its simplicity a cloud OS can boot in just a few seconds. The operating system is designed for Netbooks, Mobile Internet Devices, and PCs that are mainly used to browse the Internet. From a cloud OS the user can quickly boot into the main OS, because it is possible to continue booting the main OS in the background while using a cloud OS (at least this is the goal). Continue reading

Why You Shouldn’t Integrate Facebook, Twitter & LinkedIn

Social networking is a huge part of the Internet, providing the means for us all to connect and communicate quickly and easily. There are both positive and negative aspects to the very act of social networking, but most of us take part in the activity on at least a part-time basis. Most of us doing so on more than one site. Continue reading