Quantcast
Channel: Email management, storage and security for business email admins » Carl E. Reid
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Email Archiving Facilitates eDiscovery Processes

Let’s eliminate the confusion by understanding the difference between archiving and eDiscovery. Both are tied together, but serve two (2) distinct functions. The everyday operations performed with...

View Article



Image may be NSFW.
Clik here to view.

The Dangers of Cross Site Scripting

As of 2007, cross-site scripting carried out on websites were roughly 80% of all documented security vulnerabilities.  Cross-site scripting (XSS) is a type of computer security vulnerability typically...

View Article

Image may be NSFW.
Clik here to view.

Perfect Timing with Obama and Cyber Security Report

A report submitted to Congress on improving national cyber security is right on time, as U.S. President elect Barrack Obama prepares to assume his official duties in January 2009. The Chicago Tribune...

View Article

Image may be NSFW.
Clik here to view.

Archiving Software Key to Global Financial Crisis

So your company is still sitting on the fence about implementing archiving software for proactive eDiscovery.  Will the global financial crisis become your company’s wake up call for eDiscovery...

View Article

Image may be NSFW.
Clik here to view.

eDiscovery FRCP Rule 26 – Can your company comply?

The “Electronic Discovery Law Blog” published by K & L Gates provides detailed information for plotting an archiving course.  Rule 26 is an amendment to the United States Federal Rules of Civil...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Calms SSL Security Alert

Today the United States Computer Emergency Readiness Team (US-CERT) updated their website regarding the potential of rogue SSL certificates being generated.  US-CERT is part of the United States...

View Article

Image may be NSFW.
Clik here to view.

Why should you archive your emails?

Archive solution implementation dictates that the project management team balance 3 variables: Archiving solution still facilitates the day to day business operations, in-line with the company...

View Article

Image may be NSFW.
Clik here to view.

Six Good Lessons taught by Honeynets

Although a bit dated, a white paper titled “The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks“  provided many security lessons which are still appropriate today. This...

View Article


Image may be NSFW.
Clik here to view.

Applying Email Archiving and Management Technologies

Today, most enterprises turn to Email Archiving and Management (EAM) to reduce costs and control information overload. With digital information, specifically email and messaging mushrooming faster...

View Article


Image may be NSFW.
Clik here to view.

Serial Host Naming is Dopey

Many organizations implement the use of serial naming procedures for individual host servers. In most cases, access to these servers is through a single well known host name which uses some kind of...

View Article

Image may be NSFW.
Clik here to view.

5 Lessons that Botnets teach Honeypots

One reason organizations implement honeypots is to identify malicious botnets.  A honeypot, which is a fake network, is designed to attract and analyze botnet activity. In order for the honeypots to...

View Article

Image may be NSFW.
Clik here to view.

What is Our Email Retention Policy?

Before the email archiving software selection process starts or any implementation meetings begin, something more important must occur first.  Quite a few questions regarding email retention policy...

View Article

Image may be NSFW.
Clik here to view.

Raising the Security Wall Higher

No matter how email users may complain, friendly reminders regarding email security protecting company information assets are part of the ongoing education process.  Email users quickly forget that...

View Article


Image may be NSFW.
Clik here to view.

EDRM Guides Archive Strategy

Started in 2005, the Electronic Discovery Reference Model (EDRM) Project was created to address the lack of standards and guidelines in the electronic discovery market.  EDRM is a great reference tool...

View Article

Image may be NSFW.
Clik here to view.

Exchange as a Temporary Archive Solution

Maybe your email archiving and retention project is far off down the road, so in the interim period now might be a good time to organize email folders on your Exchange 2007 server. While you’re...

View Article


Image may be NSFW.
Clik here to view.

Tips for controlling your archive storage system

Although we take email for granted, the use of email can easily get out of control for administrators. People rarely walk down to another office to have a discussion or idea exchange.  Writing an...

View Article

Image may be NSFW.
Clik here to view.

Archive Stubbing Techniques Not Recommended

The benefits associated with archiving Microsoft Exchange email and associated data, creates many cost effective solutions. Archiving facilitates government regulatory or civil litigation searches for...

View Article


Image may be NSFW.
Clik here to view.

Hacker Security Honeypot Guide

“Honeypots: Tracking Hackers“  is a solid primer to this very necessary technology, which becomes a powerful teaching tool.  It starts with a basic explanation of honeypots and the different trapping...

View Article

Image may be NSFW.
Clik here to view.

Is this email authentic?

Authentication of message integrity ensures no one has tampered with the message or modified its content. When authentication is requested, the Message Queuing runtime digitally signs the message when...

View Article

Image may be NSFW.
Clik here to view.

Archiving is Insurance against eBlackmail

A couple of previous corporate situations in France and Japan highlight the importance for companies to implement archiving systems. Email is the primary communication source for companies being able...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images