Friday, July 10, 2009

The 10 dumbest mistakes network managers make

Seven Deadly Sins of Social Networking Security; The notification chain when a breach is suspected
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Business Intelligence Reporting
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive. Register for this Live webcast on July 15th and recieve the Forrester report, "Inquiry Spotlight: Rich Internet Applications".

rule

Spotlight Story
The 10 dumbest mistakes network managers make

When you look at the worst corporate security breaches, it's clear that network managers keep making the same mistakes over and over again, and that many of these mistakes are easy to avoid. Read full story

Related News:

Seven Deadly Sins of Social Networking Security
Admit it: You are currently addicted to social networking. Your drug of choice might be Facebook or Twitter, or maybe Myspace or LinkedIn. Some of you are using all of the above, and using them hard, even IT security practitioners who know better.

The notification chain when a breach is suspected
A few weeks ago, we provided best practice tips on preserving log data for a forensic investigation. Now that you've got the data set aside for your investigation, who else needs to get involved? Let's discuss the notification chain and how other experts support the investigation and its fallout.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

8 Keys to Ideal Configuration Assessment
Configuration assessment gives IT the ability to regain control over an increasingly dispersed and complex infrastructure. Discover the tools you need to help IT solve key security issues, thereby achieving - and sustaining - a known and trusted state.
Click here to download this whitepaper.


 

July 10, 2009

TOP STORIES | MOST DUGG STORIES

  1. Imagine the Googlemobile
  2. The 10 dumbest mistakes network managers make
  3. Microsoft may have known about critical IE bug for months
  4. 4chan hell raisers finding fame brings heat?
  5. Gmail, other Google apps, out of beta
  6. Windows 7 ramp-up will be sharp
  7. Yahoo invents 'chicken coop' data centre design
  8. The sudden departure of Cisco data center marketing honcho
  9. Online attack hits U.S. government Web sites
  10. Internet's biggest issue? IPv6 transition, new ARIN CEO says

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Perfecting your Disaster Recovery Strategy



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment