Control of Access Rights

Control of Access Rights As the labour force is more rapidly transferred within organizations, data protection through computer access control has become a major security issue. Given the investment required to maintain computer systems operational and to date, it has become more vital to limit and control the risk of users modifying the configurations of … Continue Reading »

Viruses and Spam

Viruses and Spam In recent years, computer viruses have become increasing security threats and risks of infection are on the rise. Nowadays, computers can be infected simply when browsing the Internet, without even downloading files. Spam— unwanted emails that can infect your communication tools— represent a real threat to the security of your IT infrastructure … Continue Reading »

Network Intrusions

Network Intrusions Our clients often view the Internet as the single potential source of intrusion. Attempts to intrude on your computer facilities can come from the Internet as well as within your own organization. Intrusions can be targeted, like in cases of industrial espionage or information leakage. They can be impersonal and cause serious problems … Continue Reading »

Security

The advent of the Internet meant the beginning a new era in information technology (IT) security. Now more than ever, organizations need to protect their operations from risks of intrusion, the leaking of critical information, transmission of viruses, breakdowns and power overloads likely to result in lost data or damaged facilities. Although IT security includes … Continue Reading »

Cloud computing

Cloud solutions are becoming increasingly popular and widespread. A range of cloud solutions are currently available, but each must be implemented according to clients’ specific needs. Organizations should not necessarily seek cloud solutions to lower their operating costs. Although the concept of cloud colocation— involving the sharing of material, software, Internet and maintenance resources— can … Continue Reading »