Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Why Windows To Go is perfect for BYOD

    Is your business still using Windows XP? If so, you're not alone. But, you should also seriously consider moving to a newer operating system. You could just step up to Windows 7, but there's also a pretty strong case to be made for moving to Windows 8 - particularly Windows 8 Enterprise.

  • You can lock your flash drives for free in Windows 8 with BitLocker

    Losing your USB flash drive before a big presentation is a terrible way to start a Monday. Losing a drive that also contains valuable personal data or confidential company information will ruin your whole week?and maybe your career. Luckily, Windows users can easily hedge their bets against such disasters by using the free BitLocker To Go utility to quickly encrypt portable drives.

  • Microsoft Windows 8: an operating system for the enterprise?

    Microsoft has long been the supreme leader of personal computing, with Windows 7 and prior versions of the operating used by more than 1 billion people worldwide. But since Windows 7 came out in 2009, the world has caught tablet fever, and Microsoft now faces a brave new world in which PCs are losing territory to more portable touchscreen devices.

  • Mac OS X Lion Server is a downgrade that could see corporate IT switching to Windows

    The new Profile Manager is a nice addition, but in almost every other respect, Lion Server is a downgrade that may prompt a move to Windows Server.

  • Six new and rising hacker threats

    Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.

  • Five things Google should fix in Android 3.0 Honeycomb

    Make no mistake: Google's tablet-optimised Android 3.0 represents a huge improvement overall over previous versions of Google's mobile operating system. But that's not to say it gets everything right. After extensive use across multiple tablets, I've identified five things that Google needs to address in Honeycomb.

  • Ten of the best free hard drive utilities

    Most users are satisfied with the hard drive utilities that ship with Windows, especially the more powerful partitioning and defragging tools found in Windows Vista and 7. Since you're reading this, though, you're obviously not a "most" type of user.

  • Customised malware attacks grow increasingly widespread

    The rising popularity of custom malware and the inability of antivirus software to keep pace poses potent challenges for enterprises trying to keep their systems secure.

  • The best tools for PC maintenance

    Most people, even IT pros who spend their lives maintaining corporate computing infrastructure, are so busy with life, families, work and the rest that they tend to leave periodic home PC maintenance tasks at the bottom of a long list of things that never get done.

  • The best portable encryption drives

    Users have been hauling unsecured data around on portable hard or flash drives for some years now, but there is no need to live that dangerously any more.

Featured White Papers

Securing USB flash drives with biometric authentication

Every day, people and organisations hand over their most valuable and vital personal information to government agencies. It is then up to the recipient ? a federal or state agency, or another government organisation ? to safely store that data.
Download whitepaper

Executive Guide to Internal Data Theft

Despite more security issues than ever all competing for organizations' attention, the seemingly unstoppable rise in the use of portable storage devices in the workplace is a risk that needs urgent action. This C-Level guide highlights the main risk to the organization and what can be done to combat internal data theft.
Download whitepaper

Gone in sixty seconds

The only way organizations can be sure that unauthorized devices are not being used to remove sensitive files from the network is to electronically intercept those devices as they are connected to work PCs, automatically verifying the security rights of the user and instantly allowing or blocking the attempted data transfer accordingly, finally creating a permanent record of the connection.
Download whitepaper

Enterprise Guide: 7 Steps to Securing USB Drives

This white paper reviews the security measures currently available for personal storage devices within the enterprise. It explains how companies can continue taking advantage of the convenience and productivity offered by such devices, while ensuring that sensitive information is accounted for, properly secured, and complies with relevant regulations.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map