Best IT Documents.com Blog


Windows 2kx Active Directory Properties

Posted in O S (375),Security (1500) by Guest on the December 29th, 2009
Comments Off on Windows 2kx Active Directory Properties

The cost of SPAM

Posted in eMail (66) by Guest on the December 28th, 2009

When automation is used to send out unwanted emails to very many people the total wasted time becomes a significant resource. An 80 year life expectancy is 2,524,608,000 seconds. If it takes just 2 seconds to identify and delete each unwanted email, sending out 631,152,000 unwanted emails, which arrive in inboxes in one sense, is equivalent to killing someone with a life expectancy of another 40 years.

According to http://www.internetworldstats.com/stats.htm 2,781,571,589 people used Internet by end 2011.

Comments Off on The cost of SPAM

12 Security Awareness Considerations

Posted in Information Rights Management (100),Security (1500) by Guest on the December 11th, 2009
  1. Encourage users to log off when absent and require password-protected screensavers on PCs.
  2. Encourage use of strong passwords made of mixed letters, numbers and special characters.
  3. Encourage a clear, well-defined, written security policy, with all users having a copy.
  4. Discourage installing modems on networked workstations.
  5. Encourage use of encryption techniques when handling or sending confidential email.
  6. Discourage users having a careless or indifferent attitude toward security.
  7. Discourage, under any circumstances, users giving their passwords to someone via email.
  8. Encourage users to maintain physical control of laptop cases while in public places.
  9. Encourage users to change passwords frequently, particularly if it may be compromised.
  10. Encourage awareness of social engineering attempts to breach security.
  11. Encourage active use and regular, automated updating of anti-virus software.
  12. Discourage use of the Internet for any illegal activities.
Comments Off on 12 Security Awareness Considerations