Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Document management tools enforce security to prevent data theft, but they also enable file sharing for teams that need to collaborate on projects. This seemingly contradictory pair of requirements is reconciled by the Document Management category of software.
By Stephen Cooper in Net Admin on March 11, 2025
Password problems waste time and money. Use a password management system to cut down on all of the work that password issues cause.
By Stephen Cooper in Net Admin on March 13, 2025
IT documentation is a valuable resource but in most businesses, this source of information is usually badly managed and hard to find. We'll show you the best IT documentation software that makes information available to you whenever you need it.
By Stephen Cooper in Net Admin on January 14, 2025
ManageEngine produces a large stable of infrastructure monitoring and management systems. Network monitoring OpManager is the company’s star product. We give the lowdown on this industry leader in this article.
By Stephen Cooper in Net Admin on September 2, 2024
All businesses need to plan for contingencies to keep the company running in the event of a disaster. Your email system is an essential communication channel and whether the whole building gets destroyed, or just your email server, you need to keep your email system available. Find out how.
By Stephen Cooper in Net Admin on March 10, 2025
Email has long been a channel for scammers, and now hackers are using the medium as an entry point. We show you how to protect your business with the best email monitoring software.
By Stephen Cooper in Net Admin on December 6, 2024
Email servers are vulnerable and all email systems offer an access point into businesses for hackers and scammers. Find out how to protect your company’s email system.
By Stephen Cooper in Net Admin on January 16, 2025
Kaspersky Lab and CrowdStrike have very different histories, but both work in the field of cybersecurity and both produce endpoint protection software. In this review, we take a look at Kaspersky Endpoint Security and CrowdStrike Falcon to see which is the better product.
By Stephen Cooper in Net Admin on December 24, 2024
Are you looking for a WSUS software alternative to help you stay on top of updates, hotfixes, and patch management? We show you the best WSUS server tools and alternatives to help you decide what's optimal for your business.
By Stephen Cooper in Net Admin on October 3, 2024
Page 54 of 71