57 technical terms that all true geeks should know

Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.

Continue reading

Closing loopholes in web filtering solutions

Combining web filtering with endpoint security makes sense for any company looking to deploy a layered defense and ensure that they are protecting their users, their customers and their corporate resources as thoroughly as they can.

Continue reading

2014 – The technology year in review

As 2014 draws to a close, we wanted to take a look back at the top 26 news stories, developments, and trends in technology for the year.

Continue reading

When hacking gets personal

Hackers known as the Guardians of Peace breached Sony Pictures Entertainment’s network, gaining unprecedented access to essentially everything. What are the lessons learned here?

Continue reading

The top 24 gadgets on your sysadmin’s wish list

Whether you’re looking for a small gift to give your sysadmin at the office party, or a larger gift for the sysadmin who happens to be your loved one, we’ve got you covered with this year’s list of the top 24 gadgets for sysadmins.

Continue reading

E-cigarettes chargers: not what they seem?

Hackers are purportedly bundling malware onboard with USB chargers so that, when users connect them to their computers to charge their e-cigarettes, they get more than a nicotine hit.

Continue reading

‘Not just email archiving’ – Introducing, GFI Archiver 2015

GFI Archiver 2015, a rebranded and updated version of GFI MailArchiver, is available today and we asked its product manager, Ian Bugeja, to tell us why the product has been rebranded and what’s new in this version.

Continue reading

In cyberspace, no one can hear your router scream

According to your bandwidth bills, a black hole is a region of the Internet from which cat videos, check-ins, and likes prevent anything, including productivity, from escaping. Let’s take a closer look at some of the black holes that threaten your users and data from cyberspace, and how you can protect your users from them.

Continue reading

Happy Halloween from the GFI team!

As in previous years, our colleagues in various offices let their creativity and imagination go wild and they came up with some really cool and scary costumes for Halloween.

Continue reading

Trick or treat – the 21 scariest things on your network

With Halloween just around the corner, are you prepared for tricks, or hoping only for treats. There’s an entire host of evil out there. How many of these ghastly things might be found on your network?

Continue reading