» e-mail

Company sued after manager reads personal e-mails

May 25, 2010 by Sam Narisi

Do employees have a right to privacy when using personal e-mail accounts, even when they send the messages at work? They may, depending on the company’s policies, according to a recent court decision. More…

Simple change saves a lot of toner

March 31, 2010 by Sam Narisi

Here’s one piece of advice that can help your organization cut down on toner use: More…

Is e-mail outdated?

March 17, 2010 by Sam Narisi

While many folks in business still see e-mail as a newer form of communication, apparently younger workers have already moved on. More…

E-mail from CDC? Look at it closely

December 11, 2009 by Sam Narisi

Security experts report there’s a new malware scam spreading through e-mails claiming to help recipients get a swine flu vaccine. More…

Experts: Don’t trust Web-based e-mail

November 19, 2009 by Sam Narisi

In this economy, Web-based e-mail isn’t just popular with consumers — some small businesses are taking advantage of those resources as well. More…

Check the address before sending an e-mail

October 19, 2009 by Sam Narisi

We’ve all sent e-mails to the wrong address before. But hopefully the message didn’t include confidential information about 1,300 customers. More…

Alternative to e-mail hosting: IBM uveils new solution

October 14, 2009 by Valerie Helmbreck

IT managers tired of hosting their own e-mail servers, but worried about recent problems with Web mail services like Google’s, may be interested in a new alternative. More…

Court: Ex-employee was allowed to steal from company

September 25, 2009 by Sam Narisi

Recent surveys show most laid-off or resigning employees are prepared to steal information that will help them get a new job. Companies should guard against that now, because there will probably be little they can do after it happens. More…

Solution to a common e-mail problem

September 11, 2009 by Sam Narisi

We’ve all made this mistake: hitting the Reply All button when you meant to respond only to original e-mail’s sender. Not only is it annoying, but it could result in information being divulged to the wrong people. More…

Woman fired for ALL CAPS e-mail wins court fight

September 9, 2009 by Sam Narisi

Writing in all caps is one of the most annoying e-mail etiquette breaches. But have you ever seen anyone get fired over it? More…

Look out for this new e-mail scam

August 31, 2009 by Sam Narisi

There’s a new identity theft scam being conducted through phony government e-mails. More…

E-mailing at home: The latest legal trap?

August 26, 2009 by Sam Narisi

Thanks to new technology, many employees can get their work done anytime and anywhere. That sounds great to managers — but it could get the company sued. More…

Getting more e-mails than usual? Study says your company’s going under

August 25, 2009 by Sam Narisi

The way e-mail’s used says a lot about a company’s culture. But can e-mail patterns tell you when a company’s about to go belly-up? More…

Do your firm’s managers spy on employees?

August 6, 2009 by Sam Narisi

Many employers monitor employees’ e-mail use to prevent data leaks, harassment and other legal problems. In one recent case, a manager went a step further, putting his company on the hook for a violation of privacy. More…

Is your e-mail as secure as you think it is?

July 14, 2009 by Sam Narisi

The CEO of an e-mail security firm recently dared hackers to break into his personal account. Here’s the lesson he learned the hard way. More…



  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here


  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers

    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement