Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Michael Mullins

Michael Mullins

Send Michael Mullins an email

Latest from Michael Mullins

  • Person Plugs in RJ45 Internet Connector into LAN Router Switch. Information Communication Network with Data Cable Being Connected to Port with Blinking Lights.
    Image: Gorodenkoff/Adobe Stock
    Networking

    How to wipe data from Cisco routers and switches before discarding them

    PCs aren't the only hardware you need to worry about erasing corporate data from before donating—you should apply this best practice to any network device you're discarding, including Cisco routers and switches. Mike Mullins walks you through the process of clearing the configurations of both routers and switches.

    Michael Mullins
    Published:  November 8, 2022, 2:00 AM PST Modified:  November 23, 2022, 8:13 AM PST Read More See more Networking
  • Prevent identity theft by avoiding these seven common mistakes
    Security

    Prevent identity theft by avoiding these seven common mistakes

    Identity theft may be on the rise, but you don't have to make it easy for thieves -- take steps to protect the personally identifiable information (PII) of your employees and clients. You can start by avoiding these seven mistakes.

    Michael Mullins
    Published:  May 17, 2007, 3:16 PM PDT Modified:  June 8, 2007, 10:11 AM PDT Read More See more Security
  • Take technology out of your security policies to maintain compliance
    CXO

    Take technology out of your security policies to maintain compliance

    Are you tired about wondering whether your organization is compliant with all the regulations that affect it? Mike Mullins has a rather unorthodox suggestion: Take the technology out of your policies. See why Mike says doing this will make it easier to address compliance in your company.

    Michael Mullins
    Published:  April 12, 2007, 12:27 PM PDT Modified:  June 8, 2007, 10:11 AM PDT Read More See more CXO
  • Test your security incident response plan
    Security

    Test your security incident response plan

    When was the last time you tested your organization's security incident response plan? All the response plans in the world -- however effective they may be -- won't do your organization any good if the plan doesn't work. Mike Mullins tells you how to put your response plan to the test.

    Michael Mullins
    Published:  April 5, 2007, 12:37 PM PDT Modified:  June 8, 2007, 10:10 AM PDT Read More See more Security
  • Keep DNS servers from contributing to a DDoS attack
    Developer

    Keep DNS servers from contributing to a DDoS attack

    How can a recursive query become a DDoS attack? It doesn't take much. Mike Mullins explains how an attacker can take advantage of a DNS server using recursion to perpetrate a DDoS attack, and he tells you how to prevent your organization's DNS servers from taking part.

    Michael Mullins
    Published:  March 22, 2007, 1:42 PM PDT Modified:  June 8, 2007, 10:10 AM PDT Read More See more Developer
  • Follow this six-step malware response plan
    Security

    Follow this six-step malware response plan

    Sometimes all the preventive care in the world won't protect your systems from the inevitable malware infection. What's the best way to handle it? According to Mike Mullins, an effective malware response plan includes these six steps.

    Michael Mullins
    Published:  March 8, 2007, 1:52 PM PST Modified:  June 8, 2007, 10:10 AM PDT Read More See more Security
  • Is your network for work or for play?
    Developer

    Is your network for work or for play?

    Letting employees access social networking and streaming media Web sites doesn't just put a drain on your bandwidth—it can also open up your company to a host of risks. Mike Mullins tells you how to become the most unpopular person in your company by shutting down access.

    Michael Mullins
    Published:  March 1, 2007, 2:04 PM PST Modified:  June 8, 2007, 10:10 AM PDT Read More See more Developer
  • Get ready for 2007 Daylight Saving Time changes
    Security

    Get ready for 2007 Daylight Saving Time changes

    If you operate a network in the United States, impending changes to Daylight Saving Time (DST), courtesy of the Energy Policy Act of 2005, is going to affect your operations. Mike Mullins details the effects and tells you how to prepare for them.

    Michael Mullins
    Published:  February 15, 2007, 2:11 PM PST Modified:  June 8, 2007, 10:09 AM PDT Read More See more Security
  • Conduct an impact assessment to acquire security funding
    Security

    Conduct an impact assessment to acquire security funding

    While you understand the importance of protecting personally identifiable information (PII) in your organization, that doesn't mean that the ones holding the purse strings do. How can you convince them? A good place to start is by performing an impact assessment.

    Michael Mullins
    Published:  February 8, 2007, 3:00 PM PST Modified:  June 8, 2007, 10:09 AM PDT Read More See more Security
  • How secure are your wireless device drivers?
    Networking

    How secure are your wireless device drivers?

    Even with the emphasis on securing wireless devices and how they communicate with operating systems, flaws have still surfaced, and attackers have exploited them. One often overlooked source for security flaws is the wireless device driver. Mike Mullins takes a closer look in this edition of Security Solutions.

    Michael Mullins
    Published:  January 25, 2007, 12:01 PM PST Modified:  June 8, 2007, 10:09 AM PDT Read More See more Networking
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
125 results

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice