Tiered Data Center Organization Enhances Security and Performance

Businesses continue to benefit by offering shared access data centers to partners, suppliers, and clients. The issue in this method of organization is ensuring that each...

IT Leaders: Learn the Laws Covering E-Mail Retention

Confused about which e-mails to retain, and for how long? IT leaders must demand clear guidance from the enterprise. IT can influence retention policy formation by...

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

IP Video Security Projects Put the Onus on IT

IP-based video surveillance offers a number of operational advantages over legacy Closed Circuit TV (CCTV) monitoring systems and has become the basis for most new...

E-Discovery: What It Is and How It Affects IT

Electronic evidence is now a major deciding factor in court cases. Understand the mechanics of e-discovery prior to the acquisition or implementation of records...

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.
GET HELP Contact Us
×
VL Methodology