

Kim Lindros
Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

12 hardware and software vulnerabilities you should address now
Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.
Aan de slag met Windows Store for Business
Hiermee hou je als admin de controle over de apps binnen je bedrijf.

How (and why) to customize the Windows 10 Start menu
The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it.
Tips for adding IPv6 to IPv4 networks
The IPv6 transition in your organization, more likely than not, involves bringing IPv6 into a mix that also includes IPv4. Here’s a look at what that means and how to make it work.
Tips voor het toevoegen van IPv6 aan IPv4-netwerken
We selecteren hier interessante artikelen uit het internationale netwerk van onze uitgever IDG. The original title for this story was "Transitioning from IPv4 to IPv6," but when we started researching, we quickly realized that most...

5 tips for defending against advanced persistent threats
Is your organization prepared to do battle against an APT? You'd better be.

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?
Although Windows 7 is still the dominant desktop operating system (at around 50 percent of all desktop installations as of November 2015), it's time for you to determine whether to stick with Windows 7 (or 8/8.1) or deploy Windows 10....

How to perform a clean install of Windows 10
At some point in the life of you PC, you’re probably going to need to reinstall the operating system. Find out when a reset or clean install of Windows 10 is needed, and pick up tips for to ensure a smooth transition.

Your guide to compliance in the cloud
You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.
How to choose the best vulnerability scanning tool for your business
Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...
How to explain the cloud to end users
Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
Analyst Report
Sponsored -
Video/Webcast
Sponsored