Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: David Attard

About David Attard

David Attard has been working in various roles in the IT Industry for more than 10 years. He currently specializes is in the Internet security space. He is Product Manager for GFI WebMonitor® at GFI Software™.

How to Protect Your Twitter Account from Targeted Phishing Attacks

How to Protect Your Twitter Account from Targeted Phishing Attacks

on May 31, 2013

The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, …

Read the Full Story
0
Who’s about to go crazy this March Madness?

Who’s about to go crazy this March Madness?

on March 13, 2013

Is it your IT administrator who needs to sort out all of the bandwidth issues? Is it your employees who want to access work-related resources on the web and cannot because of people streaming March Madness games?

Read the Full Story
0
Control the Harlem Shake in Your Business

Control the Harlem Shake in Your Business

on March 4, 2013

The latest craze to go viral on the web is the dance song Harlem Shake, with hundreds, if not thousands of people, gathering in costume to do ‘the shake’ in every conceivable space. Harlem Shake follows hot on the heels …

Read the Full Story
0
What the hack?

What the hack?

on March 1, 2013

The past few months have been characterised by a number of high-profile hack attacks. What the hack is going on? (Pardon the pun!) Quite a few things actually:

Read the Full Story
0
Stopping the Spread of Malware

Stopping the Spread of Malware

on October 30, 2012

We may think that stopping the spread of malicious software is the job of security system vendors. There are, however, a number of things we can do to prevent malware from spreading and causing damage. Let’s look at a few …

Read the Full Story
0
7 Reasons Why Software Solutions Are Ideal For SMBs

7 Reasons Why Software Solutions Are Ideal For SMBs

on October 4, 2012

You’re looking for a product that suits your company’s budget and requirements and the first question that will go through your head is “should I opt for software or get a hardware solution?” Both software and hardware have their advantages …

Read the Full Story
0
Take back Control of Your Bandwidth

Take back Control of Your Bandwidth

on May 18, 2012

It is a well known fact that IT Administrators are one of the least recognized and appreciated roles in a company. It is certainly true that people are quick to whine and fret when something is not working, but nobody …

Read the Full Story
8
10 Steps to Gain Effective Web Security

10 Steps to Gain Effective Web Security

on May 9, 2012

Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat …

Read the Full Story
4
2012 – The End of the World as We Know It?

2012 – The End of the World as We Know It?

on January 27, 2012

December 12, 2012 – the day that’s fated to be the ‘end of the world’. Humbug? Whatever your opinion on the Mayan prophecies, there are more important causes for concern this year that should get you brooding – particularly in …

Read the Full Story
4
4 Web Security Threats to Look Out For

4 Web Security Threats to Look Out For

on December 21, 2011

Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate …

Read the Full Story
5