Search This Blog

Monday, August 29, 2011

Small businesses fail to address data risks in server virtualization

  Vendors as partners | DHS warns that Irene could prompt phishing scams
 
  Network World IT Best Practices

Forward this to a Friend >>>


Small businesses fail to address data risks in server virtualization
A recent Symantec survey of adoption of virtualization within small businesses revealed that most companies are failing to take even the most basic steps to reduce risks to their data. Read More


WHITE PAPER: VMware

Global Cloud Computing Adoption
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps you should take for a successful implementation. Learn more.

WHITE PAPER: Fujitsu

A New Look at Energy-Efficient Servers
The family of PRIMERGY® Intel® Architecturebased servers offers a wide range of capacities, performance, and configurations to fit almost any application service requirements. Read now!

Vendors as partners
Ken Piddington, CIO of Global Partners LP, an $8 billion energy company in the Northeast, recently implemented an innovative vendor partnership program that he hopes will improve the product and services the company gets from suppliers while helping those suppliers more efficiently serve the company and benefit from the relationship. He recently outlined the plan with Network World Editor in Chief John Dix. Read More


WHITE PAPER: GFI Software

Economics of Spam
Email security threats do not discriminate. Whether you're an organization with 50 employees or a global corporation with 50,000, the reality is that spam and viruses can wreak havoc on your business, drain users' productivity and take a major toll on IT resources. Read now

DHS warns that Irene could prompt phishing scams
As Hurricane Irene barrels toward the eastern seaboard, the U.S. Department of Homeland Security is warning government agencies and private companies to be on the lookout for storm-related phishing attacks and other malicious cyberactivity. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Brace for email-attachment malware spree
A sizeable spike in malicious email attachments is just subsiding, but if history is any indicator, several smaller spikes are about to follow that use even more deceptive means than their predecessors. Read More

Cloud CIO: What 'Consumerization of IT' Really Means to CIOs
The latest trend (or over-hyped term, if you like) is "consumerization of IT." As with cloud computing, the term is somewhat ambiguous and is applied to a number of things that are recognizably related, but which differ in details. Read More

IM, SharePoint tools will edge out email, CIOs say
Email's popularity is waning, and within five years it could be eclipsed by other communication tools favored by employees, new research suggests. Robert Half Technology polled 1,400 CIOs and asked if they think real-time workplace communication tools -- such as instant messaging, SharePoint and Yammer -- will become more or less popular than email among employees. More than half bet on the newcomers.... Read More

 
 
 

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The world's geekiest license plates
  2. Future TSA: Track All 'Daily Travels To Work, Grocery Stores & Social Events'
  3. 21 Chrome Web Apps for Serious Work
  4. Why You Shouldn't Buy a Discounted TouchPad Tablet
  5. iPhone thief accidentally IDs himself via Photobucket
  6. Before the iPhone: The kings of mobile
  7. Top 10 made-in-China iPhone apps
  8. Aging East Coast infrastructure a concern after quake
  9. Tablets becoming popular bathroom activity, survey finds
  10. Palo Alto earns short list status
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: