Microsoft Windows Server 2012 will be released September 4th. Microsoft streamlined server-edition options to four and discontinued Home Server, Small Business Server, and Enterprise Edition. Windows Server 2012 editions: Foundation – Up to 15 users; OEM-only, so purchased with hardware Essentials – Up to 25 users with cloud-enablement features Standard – Unlimited users; includes two […]
Author Archive for: GLivingstone
You are here: Home / Gavin Livingstone
About Gavin Livingstone
This author has yet to write their bio.Meanwhile lets just say that we are proud Gavin Livingstone contributed a whooping 269 entries.
Entries by Gavin Livingstone
We have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security. Enforcement Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]
Google purchased Postini in 2007 to provide spam-filtering and related security and compliance services to Google enterprise-services clients; they initially branded Postini under Google Messaging, but have now integrated Postini into Google Apps for Business. They will retire the Postini brand name in 2013. Users of Google Message Security (spam filtering) will be transitioned […]
Microsoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]
Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data Authenticate and encrypt […]
Scott Gold, Senior Network Engineer, passed his Windows Server 2008 R2, Server Virtualization, Microsoft Certified Professional Examination. Congratulations Scott
A well-publicized, DNS-changing malware was detected and temporarily thwarted by the FBI late last year. The FBI will remove its temporary fix at midnight on Monday, July 9th, which could cause any remaining infected machines to lose their Internet connection. Windows-based PCs managed by Bryley Systems under our Comprehensive Support Program are not at risk. The […]
Sticking your neck out to vouch for Bryley is, as far as we’re concerned, the ultimate compliment. Because of that, everyone you refer is treated with respect, kindness and good communication whether or not Bryley can help them with IT.
The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) […]