Scomis have reviewed the process of data extractions from SIMS databases by third party applications and in particular by accounts that bypass the sims application (interface) and talk to the sims SQL…
Google and SWGfL Internet Filtering Changes Google searches utilise encryption technologies for added security and where this has previously been optional, it will be made mandatory by them in early February 2015.…
What is CryptoLocker/Wannacry? CryptoLocker/Wannacry is a malicious program that when installed will encrypt important files and documents on your computer making them unusable, and then demand payment to restore access to them.…
How do I tell if I have Java installed and what version I have? Please follow the instructions below based on the operating system installed on your computer. Windows 8 Right-click on…
Some managed networks require that your wireless device’s MAC Address ( a unique identifying code) be added to a list of devices that have permission to join the network. To obtain the…
Some networks require you to use a proxy server to access the Internet. A proxy server is another computer or device that acts as an intermediary between you and the Internet by…
Question: Workstations with access to sensitive or restricted material are password protected, and 'locked' when left unattended. Response: This should be done on all workstations, either via a group wide policy on…