Banking
Banking10 best practices for Windows security
Security risks continue to grow for organizations both large and small. Brien Posey offers 10 suggestions for making sure your networks are as well protected as possible.
You're on page 2, See the latest articles on Banking.
Security risks continue to grow for organizations both large and small. Brien Posey offers 10 suggestions for making sure your networks are as well protected as possible.
Don't get blindsided by some legal misstep you never even heard of. Calvin Sun runs through the nitty-gritty issues all consultants should be prepared for.
When something goes wrong with QuickBooks, the consequences can be pretty dire. Luckily, many common problems are easy to fix -- once you know about them.
Getting your clients to pay for your work can be tougher than the work itself. Here are some ways to keep the cash flow steady.
To deliver value, IT departments must keep a tight rein on how they use their budget - and that includes development efforts. Justin James cites some of the most common areas where IT throws its development bucks down the drain.
Your IT department can't succeed or contribute value to the organization unless you have the respect and trust of the executive team and your customers. Here are some strategies that will help you build a solid reputation for your IT group.
This information is also available as a PDF download. Like it or not, network administrators these days must take on the added task of playing Big Brother — monitoring employees’ use of the computers and network. Even if the company’s management philosophy allows for some private use of company equipment, you often need to know ...
When you have a lot of users changing data, it's easy for things to go wrong. But if you keep an audit trail of data input changes, you'll be able to determine which operators are consistently making mistakes (or not). You can also quickly fix problems before erroneous data wreaks havoc. This easy-to-implement solution will help you monitor who's changing data and when.
Audit logs are not really practical for security auditing but can be invaluable in troubleshooting DHCP server-related issues. In this article, Brien Posey discusses the anatomy of a DHCP server audit log.
You've gone to the effort of creating policies in your organization and implementing them. How do you know that they're being enforced and used? That's where a policy audit comes in. Tom Mochal shows you how it works.
How far have silicon life forms come, compared to our own carbon-based selves?
If you've been so busy that you're surprised to find yourself already in December, take a look at these articles you may have missed from the month just passed.
The eternal dilemma facing tech leaders is whether to build a business solution from scratch or mold an off-the-shelf application to needs of the enterprise. Here's what you need to know about both approaches before making this critical project decision.
Web sites are generally more compelling and useful when content is dynamically controlled. Learn the basics of generating dynamic content with this simple file-driven example in PHP and lay the groundwork for creating a more sophisticated Web experience.
It's not uncommon for a project to end early or be canceled. When that happens, you may want to negotiate a kill fee. We'll explain how it's done.