Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of mikemullins

mikemullins

Send mikemullins an email

Latest from mikemullins

  • How do I wipe data from Cisco routers and switches before discarding them?
    Networking

    How do I wipe data from Cisco routers and switches before discarding them?

    Mike Mullins walks you through the process of clearing the configurations of both routers and switches in this best-practice Cisco tip.

    mikemullins
    Published:  June 11, 2009, 11:00 PM PDT Modified:  June 11, 2009, 11:00 PM PDT Read More See more Networking
  • Craft your own Internet usage policy with this sample
    Collaboration

    Craft your own Internet usage policy with this sample

    Mike Mullins provides a general guideline for Internet and intranet usage in your organization and encourages you to educate users by distributing a formal Internet usage policy.

    mikemullins
    Published:  June 17, 2008, 12:24 AM PDT Modified:  June 17, 2008, 12:24 AM PDT Read More See more Collaboration
  • Five ways to make Outlook Express more secure
    Software

    Five ways to make Outlook Express more secure

    Outlook Express is a handy, easy-to-use e-mail client -- it just needs a little help in the security department. Mike Mullins lists five ways you can boost the security of Outlook Express.

    mikemullins
    Published:  May 5, 2008, 4:47 AM PDT Modified:  May 5, 2008, 4:47 AM PDT Read More See more Software
  • Prevent identity theft by avoiding these seven common mistakes
    Security

    Prevent identity theft by avoiding these seven common mistakes

    Identity theft may be on the rise, but you don't have to make it easy for thieves -- take steps to protect the personally identifiable information (PII) of your employees and clients. You can start by avoiding these seven mistakes.

    mikemullins
    Published:  April 20, 2008, 11:00 PM PDT Modified:  April 20, 2008, 11:00 PM PDT Read More See more Security
  • Lock down the BIOS to defend against rogue users
    Data Centers

    Lock down the BIOS to defend against rogue users

    Mike Mullins tells you how to lock down the BIOS on company machines to prevent rogue users from wreaking havoc on the network.

    mikemullins
    Published:  April 13, 2008, 11:07 PM PDT Modified:  April 13, 2008, 11:07 PM PDT Read More See more Data Centers
  • Disable NetBIOS and SMB to protect public Web servers
    Data Centers

    Disable NetBIOS and SMB to protect public Web servers

    As the connection between your internal network and the rest of the world, public Web servers always deserve an extra measure of protection. Find out one way to lock down these servers.

    mikemullins
    Published:  March 12, 2008, 11:54 PM PDT Modified:  March 12, 2008, 11:54 PM PDT Read More See more Data Centers
  • Pop-up windows: Know the difference between the good, the bad, and the annoying
    Enterprise Software

    Pop-up windows: Know the difference between the good, the bad, and the annoying

    Pop-up windows can often be a pain, but they sometimes indicate a more serious problem. Find out how to differentiate between a pop-up that's just wasting your time and one that might be trying to tell you something.

    mikemullins
    Published:  February 7, 2008, 12:50 AM PST Modified:  February 7, 2008, 12:50 AM PST Read More See more Enterprise Software
  • Establish a strategy for security breach notification
    Security

    Establish a strategy for security breach notification

    Even if your organization takes every possible precaution to protect its data, a security breach is often inevitable. What do you do if it happens? Here are some pointers for notifying those affected.

    mikemullins
    Published:  January 31, 2008, 3:42 AM PST Modified:  January 31, 2008, 3:42 AM PST Read More See more Security
  • Help users create complex passwords that are easy to remember
    Security

    Help users create complex passwords that are easy to remember

    Passwords are only as good as the policy that enforces their use. That's why it's imperative that organizations employ a written password policy -- and that they take steps to enforce it. Find out more about creating an effective password policy, and learn a trick to share with users for creating strong, complex passwords.

    mikemullins
    Published:  January 16, 2008, 2:30 AM PST Modified:  January 16, 2008, 2:30 AM PST Read More See more Security
  • Take this four-phase approach to a network risk assessment
    Networking

    Take this four-phase approach to a network risk assessment

    Assessing your network for potential risks is part of the responsibility of providing network services -- if you don't find the problems on your network, you can be sure someone else will. Learn the four phases of an effective network risk assessment, and get best practices for conducting each phase.

    mikemullins
    Published:  December 13, 2007, 4:36 AM PST Modified:  December 13, 2007, 4:36 AM PST Read More See more Networking
  • 1
  • 2
  • 3
  • 4
  • Next
33 results

TechRepublic Premium

  • TechRepublic Premium

    Employee performance review policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for employee performance reviews, which will clearly document accomplishments and areas of opportunity via an encouraging and thought-provoking analysis. This will assist in determining the next steps for employees as well as their future at the organization. This policy can be customized ...

    Published:  March 20, 2023, 12:00 PM EDT Modified:  March 21, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Employee time off policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for requesting, filing and permitting paid/unpaid time off as well as to ensure coverage during holidays, vacation(s) and other absences where staffing levels must be consistent to meet the needs of the business. From the policy: TIME OFF GUIDELINES All time off ...

    Published:  March 20, 2023, 12:00 PM EDT Modified:  March 21, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice