<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; David Kelleher</title>
	<atom:link href="http://www.gfi.com/blog/author/david-kelleher/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Survey: 32% of IT Admins Do Not Test Backup Solutions for Effectiveness</title>
		<link>http://www.gfi.com/blog/survey-32-of-it-admins-do-not-test-backup-solutions-for-effectiveness/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-32-of-it-admins-do-not-test-backup-solutions-for-effectiveness</link>
		<comments>http://www.gfi.com/blog/survey-32-of-it-admins-do-not-test-backup-solutions-for-effectiveness/#comments</comments>
		<pubDate>Mon, 24 Jun 2013 17:07:57 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[back up]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[Backup Solution]]></category>
		<category><![CDATA[Backup survey]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud backup]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data recovery]]></category>
		<category><![CDATA[GFI Software survey]]></category>
		<category><![CDATA[IT admins]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10599</guid>
		<description><![CDATA[We have conducted a new survey that reveals how small to medium-sized businesses are losing critical business information as a result of failed backups, and have suffered significant impacts as a result.  Many IT admins surveyed revealed that a failed &#8230;]]></description>
				<content:encoded><![CDATA[<p style="text-align: left;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Backup-n-IT-admins-02_RGB72dpi.jpg"><img class="aligncenter  wp-image-10771" alt="Backup-n-IT-admins-02_RGB72dpi" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Backup-n-IT-admins-02_RGB72dpi.jpg" width="432" height="2336" /></a><br />
We have conducted a new survey that reveals how small to medium-sized businesses are losing critical business information as a result of failed backups, and have suffered significant impacts as a result.  Many IT admins surveyed revealed that a failed backup has led to a loss of revenue and important company documents, including financial records, employee emails and confidential information such as social security numbers. As a result, respondents indicated that failed backups have affected customer relations, business operations and brand reputation.<span id="more-10599"></span></p>
<p>The independent, blind survey of 200 IT administrators who work at U.S. organizations with fewer than 150 employees was conducted by <a href="http://www.opinionmatters.co.uk/">Opinion Matters</a> on behalf of GFI Software™. The survey results highlight the backup behaviors of IT administrators, including methods of managing data backup, the frequency and speed of data backup and the impacts of a failed backup.</p>
<p><b>Managing data backup</b></p>
<p>One way to prevent data loss is to back up critical business files on a daily basis. However, more than half (53%) of the organizations surveyed revealed they do not conduct daily backups.  IT admins indicated the biggest reason for not backing up data every day is that it’s not an efficient use of their time, according to nearly one-third (32%) of respondents. Nearly one-quarter (23%) of IT admins said backing up data that frequently is “not necessary” or that there’s “not much data” to backup. In direct contrast, 10% of IT admins said the biggest reason for do not conducting a daily backup is because they have too much data. Other respondents suggested they do not conduct backups every day because they lack the resources, efficient technology or sufficient storage space. Some respondents – including 75% of those who work at organizations with 50-99 employees – said daily backups are disruptive to workplace productivity.</p>
<p><b>The need for speed</b></p>
<p>When asked how their current data backup processes could be improved, the number one factor cited was speed, with half of respondents indicating they wish their current backup processes were faster or more efficient. Other factors included cost (14%), security (6%) and reliability (5%), while an additional 6% said they wish their organization’s data backup processes were managed by a third-party.</p>
<p><b>Cloud concerns</b></p>
<p>Nearly two-thirds of organizations are not managing their data backup through the cloud, instead they are relying upon on-premise or virtual data backup solutions.  Respondents cited cost, security and reliability as top concerns with a cloud-based backup solution. Others suggested they prefer to have complete control over their data backup, while some indicated they were still considering their backup options. One in ten organizations relies upon a hybrid approach to data backup. One IT admin indicated cloud-based backup is only part of the solution. “We still recommend a physical backup because of a possible internet outage.”</p>
<p><b>Data loss</b></p>
<p>In order to protect critical information, companies need to regularly test their backup solutions to ensure they work properly. However, nearly one-third (32%) of IT administrators surveyed revealed their organizations do not conduct such tests. The healthcare industry is among the most lax, with two-thirds of respondents revealing they do not test their backup solutions for effectiveness. Perhaps not coincidentally, two-thirds of respondents in the healthcare industry revealed their organization has experienced a data loss. Other industries in which a high percentage of companies do not test the effectiveness of their backup solutions include: sales, media and marketing (63%) and architecture, engineering and building (56%).</p>
<p><b>Data recovery</b></p>
<p>Successful data backup is critical. But equally, if not more important, is the ability to recover that data when needed. While only 6% of respondents rely on daily data recovery, one in five respondents indicated they need to recover their data on at least a weekly basis.  Additionally, nearly three-quarters (74%) of IT admins said they recover their data at least once every six months.</p>
<p>Those respondents who indicated they were not able to recover data due to a failed backup cited loss of revenue and critical business documents as the biggest impacts on their business. Other IT admins said their organizations suffered the following consequences: <b></b></p>
<ul>
<li>The loss of data “caused weeks of problems with clients.” <b></b></li>
<li>“We lost records pertinent to our organization that were unable to be duplicated and had to be reinvented.”</li>
<li>The impact of the data loss was “…huge, in terms of meeting deadlines and productivity.”</li>
</ul>
<p><em><strong><a href="http://www.gfi.com/pages/research-brief-for-backup-survey-data.pdf">See more survey results here</a></strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-32-of-it-admins-do-not-test-backup-solutions-for-effectiveness/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Survey: 81% of U.S. Employees Check their Work Mail outside Work Hours [INFOGRAPHIC]</title>
		<link>http://www.gfi.com/blog/survey-81-of-u-s-employees-check-their-work-mail-outside-work-hours/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-81-of-u-s-employees-check-their-work-mail-outside-work-hours</link>
		<comments>http://www.gfi.com/blog/survey-81-of-u-s-employees-check-their-work-mail-outside-work-hours/#comments</comments>
		<pubDate>Mon, 20 May 2013 13:53:45 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[GFI survey]]></category>
		<category><![CDATA[survey]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10531</guid>
		<description><![CDATA[View the UK version of the infographic GFI Software™ report reveals employees regularly read email during weddings, funerals and other family events  The conventional, 9 a.m. to 5 p.m., five-day work week is a thing of the past for the &#8230;]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/05/US-infographic-03.jpg"><img class="aligncenter  wp-image-10609" alt="US-03_amc" src="http://www.gfi.com/blog/wp-content/uploads/2013/05/US-infographic-03.jpg" width="518" height="2567" /></a></p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/UK-consessions-survey.jpg" target="_blank">View the UK version of the infographic</a></p>
<p><i>G</i><i>FI Software™ report reveals employees regularly read email during weddings, funerals and other family events</i><i> <span id="more-10531"></span></i></p>
<p>The conventional, 9 a.m. to 5 p.m., five-day work week is a thing of the past for the overwhelming majority of workers at small to mid-sized businesses, according to a new survey on work-related email habits. Due to the widespread availability and use of smartphones and tablets, email is more accessible than ever and, as a result, it has become deeply embedded in the daily workplace and personal lives of most employees. The independent, blind survey of 503 employees in workplaces in the U.S. was conducted by <a href="http://www.opinionmatters.co.uk/">Opinion Matters</a> on behalf of <a href="http://www.gfi.com/">GFI Software</a>. The results highlight employee habits around email usage, including response frequency during the workday as well as after hours.</p>
<p><b>The new 24/7 paradigm</b></p>
<ul>
<li>Based on the reported email habits of survey respondents, the line between work and home life has become blurred. More than three-quarters of respondents (81%) said they check their work email on weekends, 55% check email after 11 p.m. and 59% keep on top of their work email while on vacation.</li>
</ul>
<ul>
<li>Outside of regular work hours, more than six in 10 (64%) check email at least once a day. 12% of employees said they check work email <i>in real time</i> beyond the standard workday.</li>
</ul>
<ul>
<li>One in 10 respondents admitted to checking work email at a child’s school event, 9% at a wedding, and 6% at a funeral. An additional 6% said they logged into their work email while they or their spouse was in labor.</li>
</ul>
<ul>
<li>On the flip side, nearly one-third (30%) of employees also said they send personal emails from their work account.</li>
</ul>
<p><b>Email used at the office more than any other form of communication</b></p>
<ul>
<li>Despite the growing use of instant messaging platforms, email dwarfs other forms of office communication.  44% of respondents use email at work more than any other communications format, with 28% relying primarily on the phone, 22% on face-to-face, and 6% on instant messaging.</li>
</ul>
<ul>
<li>Email is a constant presence in the lives of employees during the workday. More than three-quarters (76%) of respondents said they typically reply to emails within one hour during work hours, with nearly one-third of them (32%) replying within 15 minutes.</li>
</ul>
<p><b>An organizational and business intelligence tool </b></p>
<ul>
<li>Many employees use email for more than just communicating. Well over half (58%) use it as a means of storing and retrieving information.</li>
</ul>
<ul>
<li>Nearly two-thirds (62%) of respondents use specific folders to organize their email for easier access, and 29% of employees archive their email.</li>
</ul>
<ul>
<li>The oldest saved email by a survey respondent was received back in 1994.</li>
</ul>
<ul>
<li>Less than one-quarter (24%) of employees said they use their email as a business intelligence tool, identifying a massive missed opportunity to extract value from email data.</li>
</ul>
<p><b>Differences among regions and professions   </b></p>
<ul>
<li>Employees in the Southwest are the quickest to respond to email, with 42% replying within 15 minutes of an email arriving. Only 27% of residents in the Midwest respond as quickly.</li>
</ul>
<ul>
<li>Residents of the Southwest are most likely to have checked their email while they or their spouse was in labor (14%). Just 3% of employees in the Northeast have done so.</li>
</ul>
<ul>
<li>Professionals who say they have checked email at a funeral are more likely to work in IT and telecommunications (14%) and finance (13%). People working in sales, media and marketing and health care said they have never checked email at a funeral.</li>
</ul>
<ul>
<li> Legal (38%), IT and telecommunications (32%), and manufacturing (34%) professionals are more likely to respond to emails within 15 minutes. Professionals who think that responding to an email within one working day is sufficient are more apt to work in education (23%), retail, catering and leisure (20%) and arts and culture (20%).</li>
</ul>
<ul>
<li>Employees at larger companies are more likely to check email during off hours.  Two-thirds (66%) of respondents who work at companies with fewer than 10 employees  check email outside of regular work hours, while 75% of those who work at large companies said the same.</li>
</ul>
<ul>
<li>During vacations, 74% of sales, media and marketing professionals said they check their email. In contrast, less than half (46%) of manufacturing and utilities employees do so.</li>
</ul>
<p><b>Overwhelmingly, email is viewed </b><b>positively, not negatively   </b></p>
<ul>
<li>Workers overwhelmingly appreciate the value of email, despite its omnipresence in daily life. 90% of respondents said email is a “blessing,” with just one in ten (10%) considering it a “curse.” Regardless of all the stresses and strains that a deluge of email can bring, it is still preferred to the way we used to work.</li>
</ul>
<p>For more information and to view the results of a similar survey in the UK, check out our research brief <a href="http://www.gfi.com/documents/Research_Brief_UK_US.PDF">here</a>.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-81-of-u-s-employees-check-their-work-mail-outside-work-hours/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Survey: Confessions of the IT Crowd [Infographic]</title>
		<link>http://www.gfi.com/blog/confessions-of-the-it-crowd/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=confessions-of-the-it-crowd</link>
		<comments>http://www.gfi.com/blog/confessions-of-the-it-crowd/#comments</comments>
		<pubDate>Wed, 27 Mar 2013 11:07:22 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[admin stress]]></category>
		<category><![CDATA[GFI survey]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[IT administrator]]></category>
		<category><![CDATA[IT department]]></category>
		<category><![CDATA[stress]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10411</guid>
		<description><![CDATA[View the UK version of the infographic The stresses of the IT administrator continue to become a mainstay of office culture that people see as inevitability. Whether their time is spent dealing with issues that should never have occurred in &#8230;]]></description>
				<content:encoded><![CDATA[<p><a style="color: #ff4b33; line-height: 24px; text-align: center;" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/Infographic_USA_300dpiCMYK.jpg"><br />
<img class="aligncenter  wp-image-10526" alt="Infographic_USA_300dpiCMYK" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/Infographic_USA_300dpiCMYK.jpg" width="576" height="1948" /></a></p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/05/Infographic_UK_300dpiCMYK.jpg" target="_blank">View the UK version of the infographic</a></p>
<p>The stresses of the IT administrator continue to become a mainstay of office culture that people see as inevitability. Whether their time is spent dealing with issues that should never have occurred in the first place or explaining common knowledge to end users, IT admins often feel that they are working far outside the scope of their job description and that they are continually underappreciated.</p>
<p>With that in mind, GFI Software™ surveyed more than 400 IT administrators in the US and the UK to gauge their stress levels and the various workplace issues that factor into them. Among the stressors were managers, lack of budget and lack of additional IT staff, but end users are always a particular source of stress. As one respondent put it when asked about the ridiculous things that end users do, “just showing up is usually bad enough.” You can read the <a href="http://www.gfi.com/documents/research-brief-uk-us.pdf ">full results here</a>, but in the meantime, here are some of the more outlandish and (surprisingly) common issues that IT admins say they face when dealing with end users and the questions they wish they could ask.<span id="more-10411"></span></p>
<h2><strong style="font-size: 16px;">Why did you feed your machine?</strong></h2>
<p>It’s hard enough to keep machines healthy and networks running smoothly in the face of cyber threats, regular maintenance and plain old aging hardware. It doesn’t help when end users consistently fail to take basic steps to care for the work-issued hardware with which they have been entrusted. A large number of admins recounted times when users inexplicably used their DVD drives as cup holders, not only endangering the computer’s life, but also that of the user. Even with proper beverage placement, spills will happen, but IT admins then face uncomfortable conversations with users who refuse to admit that the spill was theirs.</p>
<h2><strong style="font-size: 16px;">Would you treat a person that way?</strong></h2>
<p>IT admins are often baffled by the complete lack of common sense that some end users seem to have. Time that could be spent addressing legitimate IT issues or performing time-intensive maintenance is wasted when admins are called to “fix” computers that aren’t plugged in or turned on. One respondent reported having to help a user that broke the plastic connector on an Ethernet cable by trying to force it into a telephone jack, while another became angry because a non-touch screen computer was not responding when touched.</p>
<blockquote><p>One of the most puzzling responses described an encounter with an end user that would say “my screen messes up when I do this” before “violently twisting the screen on their laptop.”</p></blockquote>
<h2><strong style="font-size: 16px;">You just don’t care, do you?</strong></h2>
<p>While clueless users can be a hassle, IT admins have an even harder time dealing with careless individuals who generate avoidable problems and then complain when it isn’t dealt with immediately. Multiple respondents said that they had been called to clean malware off users’ systems because they had been visiting inappropriate sites and one of them even left the window open and didn’t try to hide it. Another left their device in a public place and grew irate when the IT staff said that they did not have any way to track it down. Most IT administrators would say that they didn’t sign up to clean up others’ messes, but they often find themselves doing just that.</p>
<h2><strong style="font-size: 16px;">What’s the problem again?</strong></h2>
<p>Admins also express frustration over having to become de facto teachers for users who don’t have the most basic computer skills such as the ability to turn their computer on, restart their system or to find a key on the keyboard. They are also often surprised at users’ inability to answer simple questions that would speed troubleshooting processes along.</p>
<blockquote><p>One admin reported that an employee responded “Microsoft Word” when asked which operating system their PC was running on. Another recounted a time that he was called to explain “if a zero was the letter zero or the number.”</p></blockquote>
<h2><strong style="font-size: 16px;">Are you sure you should be working from home unsupervised?</strong></h2>
<p>One admin reported that during a support call with a remote user, this exchange actually occurred:</p>
<blockquote><p>“When I asked what version of windows they were running I was told they have patio doors. Good old days on the help desk for home workers.”</p></blockquote>
<h2><strong style="font-size: 16px;">Do you have any idea what I’m actually supposed to be doing?</strong></h2>
<p>Some users view IT admins as office handymen or really emphasize the “information” part of information technology, and regularly call the help desk with questions about burned out light bulbs in the office or about what time it is in a foreign country.</p>
<h2><strong style="font-size: 16px;">Did you just destroy my network?</strong></h2>
<p>Most of these issues with end users are mere annoyances and can be remedied quickly. But several respondents had to throw their hands up at one point when their entire network was crashed by a user. Although they didn’t get into details, comments like “crashed our system” and “destroyed whole IT department” sound much more serious than the average screw up.</p>
<p>Similar to the findings in last year’s first annual GFI <a href="http://www.gfi.com/blog/survey-5-most-ridiculous-things-it-admins-have-seen-business-users-do-infographic/">IT Admin Stress Survey</a>, end users are still inadvertently deleting important files, inserting media into the wrong slots, responding to obvious phishing attempts and downloading malicious files. It is interesting to note that in general, employees seem to be aware that their actions when using company hardware have consequences and are monitored by the IT staff. In fact one survey respondent described an employee that would cover his machine’s webcam with a sticky note for fear that IT was watching him remotely. However, this does not seem to cut down on the number of end users caught sleeping on the job, browsing non-work related sites or endangering the company network with careless web browsing.</p>
<p>Maybe having an annual System Administrator Appreciation Day just isn’t enough. Ultimately, IT administrators are there to protect users’ machines and ensure that everything is running smoothly so that others can do their work without worrying about whether their PCs are going to work properly that day.</p>
<p>Have you ever been the person that caused an unnecessary problem for your IT department and later felt guilty about it? Are you an IT administrator with an IT horror story that no one believes? Let us know in the comment section below.</p>
<p><a href="http://www.gfi.com/company/news-and-events/press-releases">Find out more about the survey results.</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/confessions-of-the-it-crowd/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Web Filtering to Off-Network Laptop and Notebook Devices with GFI WebMonitor® 2013</title>
		<link>http://www.gfi.com/blog/web-filtering-to-off-network-laptop-and-notebook-devices-with-gfi-webmonitor-2013/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-filtering-to-off-network-laptop-and-notebook-devices-with-gfi-webmonitor-2013</link>
		<comments>http://www.gfi.com/blog/web-filtering-to-off-network-laptop-and-notebook-devices-with-gfi-webmonitor-2013/#comments</comments>
		<pubDate>Thu, 21 Mar 2013 16:25:12 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[filtering policies]]></category>
		<category><![CDATA[GFI WebMonitor]]></category>
		<category><![CDATA[GFI WebMonitor 2013]]></category>
		<category><![CDATA[Web access]]></category>
		<category><![CDATA[Web access activity]]></category>
		<category><![CDATA[web browsing]]></category>
		<category><![CDATA[web filtering]]></category>
		<category><![CDATA[Web filtering solutions]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10395</guid>
		<description><![CDATA[Today we launched GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-WebMonitor-logo2.png"><img class="size-medium wp-image-10140 alignright" style="border: 0px solid black; margin: 10px;" title="GFI WebMonitor " alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-WebMonitor-logo2-300x108.png" width="300" height="108" /></a>Today we launched GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go.<span id="more-10395"></span></p>
<p>SMBs have long used Web filtering solutions, like GFI WebMonitor, to prevent the productivity, bandwidth and security issues associated with Web browsing in the workplace. But, with telecommuting on the rise and more companies giving employees laptops and notebooks to access corporate resources remotely, IT managers have lost visibility into browsing activity on work-issued devices – posing legal liabilities for the company, among other risks.</p>
<p>To help businesses overcome this challenge, GFI WebMonitor’s new roaming agent extends corporate browsing policies and filtering protection to laptops and notebooks running outside of the corporate network – and does so without compromising connectivity speeds. With this feature in place, IT managers can trust that road warriors, remote employees and workers who take their devices home at night are held to the same Internet usage policies that in-house employees follow. This capability is also beneficial for small businesses that use laptops and notebooks as their primary computing devices.</p>
<p>For maximum flexibility, GFI WebMonitor’s roaming Web filtering agent enables IT managers to create and apply different filtering policies depending on a device’s location. For example, streaming media may be allowed once a device leaves the corporate network, but specific categories of websites, such as gambling and adult sites, remain inaccessible. Additionally, GFI WebMonitor is now able to log Web access activity occurring outside of the corporate network in addition to in-house activity and provide full reporting capabilities regardless of a user’s location.</p>
<p><em>Want to learn more about this product? Check out </em><a href="http://www.gfi.com/internet-monitoring-software?adv=13558&amp;loc=14"><em>GFI</em><em> WebMonitor</em></a><em> and find out how your business can get even more from web filtering, or register for a </em><a href="http://www.gfi.com/pages/webmon-selection-download.asp?adv=13558&amp;loc=28"><em>free trial</em></a><em> </em><em>and give it a spin today!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/web-filtering-to-off-network-laptop-and-notebook-devices-with-gfi-webmonitor-2013/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Cost Savings, Efficiency Gains and Flexibility with GFI FaxMaker® Online</title>
		<link>http://www.gfi.com/blog/cost-savings-efficiency-gains-and-flexibility-with-gfi-faxmaker-online/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cost-savings-efficiency-gains-and-flexibility-with-gfi-faxmaker-online</link>
		<comments>http://www.gfi.com/blog/cost-savings-efficiency-gains-and-flexibility-with-gfi-faxmaker-online/#comments</comments>
		<pubDate>Tue, 29 Jan 2013 15:29:26 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[email to fax]]></category>
		<category><![CDATA[fax]]></category>
		<category><![CDATA[fax communications]]></category>
		<category><![CDATA[fax to email]]></category>
		<category><![CDATA[faxing]]></category>
		<category><![CDATA[faxing needs]]></category>
		<category><![CDATA[FaxMaker Online]]></category>
		<category><![CDATA[GFI FaxMaker Online]]></category>
		<category><![CDATA[Print-to-fax]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10240</guid>
		<description><![CDATA[We’ve extended faxing to the cloud with GFI FaxMaker Online, a streamlined cloud-based fax solution designed to meet the needs of small and medium-sized businesses (SMBs). GFI FaxMaker Online provides ubiquitous faxing from any Internet-connected device, with no hardware, software &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/Online-faxing.jpg"><img class="alignright  wp-image-10241" style="margin: 10px; border: 0px solid black;" title="Online faxing" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/Online-faxing-300x200.jpg" width="243" height="162" /></a>We’ve extended faxing to the cloud with <a href="https://www.faxmakeronline.com?adv=13558&amp;loc=8">GFI FaxMaker Online</a>, a streamlined cloud-based fax solution designed to meet the needs of small and medium-sized businesses (SMBs). GFI FaxMaker Online provides ubiquitous faxing from any Internet-connected device, with no hardware, software or dedicated phone lines required.</p>
<p>GFI FaxMaker Online is based on a monthly subscription model that allows instant access and easily scales to meet an organization’s faxing needs, enabling both fax-to-email and email-to-fax communications within minutes of signup. Benefits include:<span id="more-10240"></span></p>
<ul>
<li><strong>Email-to-fax and fax-to-email capabilities: </strong>Send and receive faxes from any email client or email server, whether in the cloud or on premise.</li>
<li><strong>Print-to-fax functionality:</strong> Allows for printing to fax from any application that can print.</li>
<li><strong>Multiple email-to-fax formats: </strong>Document formats doc and docx, xls and xlsx, pdf, html, txt, rtf, ppt and .pptx formats are supported when sending a fax via email.</li>
<li><strong>Easy-to-use administration portal:</strong> The online dashboard provides a clear view of usage and offers account management capabilities across departments and users.</li>
</ul>
<p>Sending and receiving documents by fax is of paramount importance to businesses in several key industries, including healthcare organizations, law firms and financial services companies, which continue to rely on fax communications to meet security and compliance regulations, along with retaining the legal admissibility of documents sent electronically from point to point. In an <a href="http://www.gfi.com/page/132376/gfi-survey-finds-85-of-us-businesses-rely-on-fax-technology">independent blind survey</a> of 1,008 office workers conducted by Opinion Matters on behalf of GFI Software in October 2012, 85% of respondents said their businesses continue to make use of faxing in some capacity.</p>
<p>The survey also revealed potential security problems with traditional paper faxing, with nearly half of respondents (49%) admitting that they had read a paper fax that was intended for someone else. As a completely paperless solution, GFI FaxMaker Online eliminates the possibility of a paper fax getting into the wrong hands by ensuring faxes are routed directly to the intended individual or workgroup recipient.</p>
<p><strong><em>Learn more on how your business can benefit from <a href="https://www.faxmakeronline.com?adv=13558&amp;loc=8">GFI FaxMaker Online</a>, or start your <a href="http://landfax.gfi.com/online-faxing-sm/?adv=13558&amp;loc=22">free 30-day trial</a> today!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/cost-savings-efficiency-gains-and-flexibility-with-gfi-faxmaker-online/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI EventsManager® Now Includes Proven Active Monitoring Functionality</title>
		<link>http://www.gfi.com/blog/gfi-eventsmanager-now-includes-proven-active-monitoring-functionality/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-eventsmanager-now-includes-proven-active-monitoring-functionality</link>
		<comments>http://www.gfi.com/blog/gfi-eventsmanager-now-includes-proven-active-monitoring-functionality/#comments</comments>
		<pubDate>Tue, 22 Jan 2013 15:00:50 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Active Monitoring]]></category>
		<category><![CDATA[anti-tampering]]></category>
		<category><![CDATA[anti-tampering protection]]></category>
		<category><![CDATA[console security]]></category>
		<category><![CDATA[GFI EventsManager]]></category>
		<category><![CDATA[log management]]></category>
		<category><![CDATA[Network Server Monitor]]></category>
		<category><![CDATA[storage]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10234</guid>
		<description><![CDATA[GFI EventsManager, the company’s award-winning log management software, now includes the established active network and server monitoring capabilities found in the company’s popular GFI NetworkServerMonitor® solution. This new functionality, combined with GFI EventsManager’s existing log management capabilities, gives IT administrators &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/esm-logo21.jpg"><img class="alignright size-medium wp-image-10237" style="margin: 12px; border: 0px solid black;" title="GFI EventsManager " alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/esm-logo21-300x173.jpg" width="300" height="173" /></a>GFI EventsManager, the company’s award-winning <a href="http://www.gfi.com/eventsmanager?adv=13558&amp;loc=6">log management software</a>, now includes the established active network and server monitoring capabilities found in the company’s popular <a href="http://www.gfi.com/network-server-monitoring-on-premise?adv=13558&amp;loc=13">GFI NetworkServerMonitor</a><sup>®</sup> solution. This new functionality, combined with GFI EventsManager’s existing log management capabilities, gives IT administrators a holistic view of their infrastructure’s performance.<span id="more-10234"></span></p>
<p>Active network and server monitoring provides real-time, active monitoring of assets, network infrastructure, applications and services. These advanced monitoring checks work in conjunction with GFI EventsManager’s log-based monitoring system to track different operational aspects of the IT environment, including the functionality and availability of network protocols, performance of network devices, and usage and performance of server and infrastructure services. This unique combination of features also equips admins with the information required to quickly and easily troubleshoot incidents reported by the active monitoring system.</p>
<p>The latest version of GFI EventsManager also includes enhanced console security to help companies comply with industry guidelines requiring that data access is granted on a “need-to-know” basis. IT admins can now enforce discretionary data access by assigning specific computers to each EventsManager user. By doing so, IT can grant users admission into the GFI EventsManager console while limiting their access to only the configuration, reporting and log browsing data coming from the computers they manage.</p>
<p>Additional features in the latest version of GFI EventsManager include:</p>
<ul>
<li><strong>Flexible storage options</strong> – EventsManager’s database has been enhanced to include physical deletion of event logs in a secure and audited manner. This new feature frees up disk space occupied by deleted events. Adding another layer of flexible storage, IT admins now also have the ability to log data directly to remote storage for data centralization purposes.</li>
<li><strong>Anti-tampering protection </strong>– In addition to encrypted storage and controlled access to data within the EventsManager console, the solution also now includes the ability to hash log data to further protect against attempts to damage log data from outside the product.</li>
<li><strong>Log support by default </strong>–<strong> </strong>A<strong> </strong>new XML parsing schema, available by default, enables admins to collect, analyze, interpret and store data contained in XML files. An added DHCP text log parsing schema enables audit and monitoring of DHCP IP assignments on Windows<sup>®</sup> DHCP servers.</li>
<li><strong>Import/export functionality</strong> – EventsManager now includes the ability to import and export events to/from other EventsManager databases based on a schedule, as well as optionally based on filters. IT admins can now move event data between two databases as well.</li>
</ul>
<p><em><strong>Learn more about what <a href="http://www.gfi.com/eventsmanager/?adv=13872&amp;loc=1" target="_blank">GFI EventsManager</a> can do for you, or start a <a href="http://landesm.gfi.com/intrusion-detection-sm/?adv=13558&amp;loc=20">free trial </a>today.</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-eventsmanager-now-includes-proven-active-monitoring-functionality/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>2013 Through the Crystal Ball</title>
		<link>http://www.gfi.com/blog/2013-through-the-crystal-ball/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=2013-through-the-crystal-ball</link>
		<comments>http://www.gfi.com/blog/2013-through-the-crystal-ball/#comments</comments>
		<pubDate>Fri, 28 Dec 2012 15:00:58 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data theft]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[IT trends]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Mobile Threats]]></category>
		<category><![CDATA[MySpace]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[web threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10078</guid>
		<description><![CDATA[Predicting the future is one hazardous occupation (ask the Mayans), yet in the world of IT and technology, trends and habits have a tendency to repeat themselves year after year. In this post we look at some of the things &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/2013.jpg"><img class=" wp-image-10079 alignright" style="border: 0px solid black; margin: 10px;" title="2013" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/2013-300x172.jpg" alt="" width="243" height="140" /></a>Predicting the future is one hazardous occupation (ask the Mayans), yet in the world of IT and technology, trends and habits have a tendency to repeat themselves year after year. In this post we look at some of the things that will most likely happen in 2013 – affecting both your users and the business in general.<span id="more-10078"></span></p>
<h2>1. MySpace comeback</h2>
<p>A recent study shows that MySpace is one of the poorest performing social media platforms of 2012; however, its latest site redesign and strategy could be enticing enough for netizens to give it a second (or third) chance. If MySpace becomes as buzz worthy as Google+ prior to its launch, we can expect criminals to take advantage of this. Expect a first-off shenanigan like bogus MySpace invites for this one.</p>
<h2>2. The debate on BYOD will go on</h2>
<p>For some, BYOD (Bring Your Own Device) was already a reality even before the term was invented and security measures were instituted in the company. It seems this policy is already bound to happen as more and more people bring and use their own personal devices. Now that an increasing number of employees and enterprises are embracing this policy, serious questions on security come in. As long as security remains an issue that is not addressed, BYOD will continue to be a hot topic of debate.</p>
<h2>3. Online criminals will continue to bait mobile users with fake apps</h2>
<p>Regardless of a security measure in place, people are still finding bogus apps served on Google Play. It is now up to the users to fend for themselves by checking and double-checking the credibility of the app creators.</p>
<h2>4. Phishing, other scams, hacking and malware will continue to target gamers</h2>
<p>Gamers on any gaming platform (Steam, PC, PS2, XBox, even social networking sites) have been subjected to phishing attacks and malware attacks in the past. Whether gamers are entering their account credentials to sleek looking bogus gaming sites to which they were redirected from an email or downloading a keygen for their games, the gaming industry is a market cybercriminals will not fail to exploit.</p>
<h2>5. Social media platforms will continue to be rife with web threats</h2>
<p>Social media platforms like Facebook, Twitter, and Tumblr make it easy for anyone to share and see shared posts in real time. This, however, can also mean that what you&#8217;re sharing might lead someone to panic unnecessarily, click a link that will take them to fill in surveys, or download and install something to their system.</p>
<h2>6. There&#8217;s still that issue of passwords</h2>
<p>It&#8217;s very alarming to see that bad passwords used a couple of years back are still being used now. As long as internet users continue to ignore the liabilities of recycling and reusing passwords, creating passwords that are too short and predictable, more accounts and sites will be in the hands of criminals.</p>
<h2>7. Compromising/defacing sites will remain a means to express online protest and &#8220;tough love&#8221;</h2>
<p>This so-called &#8220;Hacking for a cause&#8221; will continue as a means to protest against an ideology, law, philosophy, etc</p>
<h2>8. Vulnerabilities in third party software</h2>
<p>Hackers will continue to target 3rd party programs, such as Adobe Flash, Oracle Java, and Adobe Acrobat for software vulnerabilities. They realize patching 3rd party applications is an area that many IT admins simply do not address. The solution to this would be to run a product that provides patch management for 3rd party applications, such as GFI LanGuard.</p>
<h2>9. Social engineering &#8211; you can&#8217;t patch people</h2>
<p>Hackers will continue targeting employees, by sending them emails that look legitimate, in hopes that the user falls for their trap. These emails may contain malicious attachments or URLs that point to malicious websites. IT admins should ensure they have an antivirus solution installed on the server and endpoints, as well as have the ability to filter malicious URLs.</p>
<h2>10. Data loss</h2>
<p>Nearly everyone at one point in their life has lost a mobile device, such as a smart phone. With increase in employees following the &#8220;Bring Your Own Device&#8221; trend, IT admins need to know which devices are actually connected to their networks. They need to put policies in place that allow them to locate, lock, or wipe the device, and the employee needs to sign an agreement stating they approve of this. If the employee wants to connect their personal device to the corporate network, they have to agree to the terms set in place by the IT admin. If the admin has no way of tracking/wiping these devices, sensitive data may be lost, or put into the wrong hands.</p>
<h2>11. Data theft</h2>
<p>Miscreants will continue targeting high profile companies, in hopes of gaining access to sensitive data. We have seen the Anonymous group in 2010-2012 breach several corporations and government entities, and believe they will continue to do so in 2013. Typically, they are performing SQLi attacks, or SQL injection attacks, which allow them to reveal sensitive data stored in databases. IT admins should not only perform 3rd party audits of their web servers, but also have a contingency plan, in the event something goes wrong.</p>
<h2>12. Mobile threats</h2>
<p>Mobile threats will continue to escalate into a bigger problem for enterprises. Hackers realize that IT admins do not necessarily run an antivirus solution on their mobile endpoints, and as such, will target them. Malware is being created to steal data from Android devices. In order to keep this attack vector under control, corporations need to put security policies in place, which include installing an antivirus solution on mobile devices.</p>
<h2>13. Cloud-based storage services havoc</h2>
<p>More and more enterprises will use cloud-based storage services to store corporate data to allow for easy access when users are mobile. This is a nightmare for IT administrators because they have no clue where the data is going. Cloud-based storage services can be installed on any machine or device and so data is also accessed in many ways. Admins will need to regulate and control how cloud-based storage services are used in a corporate environment. Cloud services may also bypass content checking features in antivirus and anti-spam products because data is not being sent by email.</p>
<p>Do you have any other predictions for 2013? Leave us a comment below and let us know!</p>
<p><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/2013-through-the-crystal-ball/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Survey: Americans Stress Benefits and Demands of Telecommuting [Infographic]</title>
		<link>http://www.gfi.com/blog/survey-americans-stress-benefits-and-demands-of-telecommuting-infographic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-americans-stress-benefits-and-demands-of-telecommuting-infographic</link>
		<comments>http://www.gfi.com/blog/survey-americans-stress-benefits-and-demands-of-telecommuting-infographic/#comments</comments>
		<pubDate>Mon, 17 Dec 2012 14:01:05 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[flexibility]]></category>
		<category><![CDATA[Lower stress]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[Mobile access]]></category>
		<category><![CDATA[office communication]]></category>
		<category><![CDATA[office meetings]]></category>
		<category><![CDATA[online communication]]></category>
		<category><![CDATA[productive]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[remote control]]></category>
		<category><![CDATA[TeamViewer]]></category>
		<category><![CDATA[TeamViewer Survey]]></category>
		<category><![CDATA[telecommuters]]></category>
		<category><![CDATA[uSamp]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10029</guid>
		<description><![CDATA[TeamViewer®, one of the world’s most popular providers of remote control and online meetings software, recently announced the findings of its survey of 500 American adults ages 18 and older who work from home either full-time or part-time, conducted online &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.teamviewer.com/">TeamViewer®</a>, one of the world’s most popular providers of remote control and online meetings software, recently announced the findings of its survey of 500 American adults ages 18 and older who work from home either full-time or part-time, conducted online by uSamp in October. The survey, which was drafted based on TeamViewer’s experience in office communication, found that half (50%) of telecommuters feel that they are more productive working from home, with 23% even saying that they are much more productive.<span id="more-10029"></span></p>
<p>The survey also found that 45% of Americans believe the average telecommuter saves themselves from traveling 21-50 miles per day. This statistic becomes even more interesting given that the survey revealed 80% of Americans say that saving money on gas and having no daily commute are among the biggest benefits of working from home. The survey also showed further benefits Americans see when telecommuting including:</p>
<ul>
<li>Improved work/life balance – 53.56%</li>
<li>Lower stress and better health – 51.98%</li>
<li>Ability to complete household chores while working – 50.4%</li>
<li>No involvement in office gossip – 37.55%</li>
<li>Ability to be near children during the daytime – 25.49%</li>
</ul>
<p>When asked what advanced technologies Americans expect from telecommuting solutions, 45% said remote control of their computer desktops at work followed by:</p>
<ul>
<li>Mobile access to my files both at work and at home – 43.48%</li>
<li>Ability to participate in office meetings as if you were in the same room – 40.32%</li>
<li>Ability to print remotely – 39.92%</li>
<li>Ability to work on a document through screen-sharing – 37.55%</li>
<li>Face to face video communication with colleagues and clients – 37.15%</li>
</ul>
<blockquote><p>“With an increasing number of employees requesting flexibility in the workplace, telecommuting has become inevitable,” said Holger Felgner, General Manager at TeamViewer. “TeamViewer provides a solution allowing employees to work from home without limiting their access to materials and tools they may not have otherwise.”</p></blockquote>
<p>Have a look at our infographic (click on image to enlarge) to see other highlights from the survey:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Team2.jpg"><img class="size-medium wp-image-10030 aligncenter" title="TeamViewer Survey Infographic" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Team2-116x300.jpg" alt="" width="116" height="300" /></a></p>
<p>Learn more about how <a href="http://www.teamviewer.com/">TeamViewer</a> can help improve your business with remote support and online meetings, or simply download your <a href="http://www.teamviewer.com/en/index.aspx">free trial</a> now.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-americans-stress-benefits-and-demands-of-telecommuting-infographic/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>GFI LanGuard® now supports Mac OS® X</title>
		<link>http://www.gfi.com/blog/gfi-languard-now-supports-mac-os-x/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-languard-now-supports-mac-os-x</link>
		<comments>http://www.gfi.com/blog/gfi-languard-now-supports-mac-os-x/#comments</comments>
		<pubDate>Tue, 04 Dec 2012 16:29:37 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[Mac OS X]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9948</guid>
		<description><![CDATA[Today we’re announcing that GFI LanGuard now supports vulnerability assessment and patch management for computers running the Mac OS X operating system. The latest version of the company’s award-winning, comprehensive patch management, vulnerability assessment and network auditing software for small &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/GFILanGuardLogoLeft_GEN_GEN.jpg"><img class="alignright size-medium wp-image-9949" style="margin: 10px 14px; border: 0px solid black;" title="GFILanGuardLogo" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/GFILanGuardLogoLeft_GEN_GEN-300x42.jpg" width="300" height="42" /></a>Today we’re announcing that GFI LanGuard now supports vulnerability assessment and patch management for computers running the Mac OS X operating system. The latest version of the company’s award-winning, comprehensive patch management, vulnerability assessment and network auditing software for small and medium-sized businesses (SMBs) now also features a deeper portfolio of compliance standards reporting tools. IT administrators can generate streamlined and dedicated reports for nine of the top regulatory compliance standards, including PCI-DSS (Payment Card Industry Data Security Standard), SOX (Sarbanes-Oxley), HIPAA (Health Insurance Portability and Accountability Act) and FISMA (Federal Information Security Management Act).<span id="more-9948"></span></p>
<p>Trends such as “BYOD” (Bring Your Own Device) have made vulnerability assessments a mission-critical component to maintaining a secure network. As administrators attempt to regulate the massive influx of outside hardware being brought into the workplace and connected to the corporate network, including mobile devices and laptops running different operating systems, such as Windows® and Mac OS X, making sure these devices do not introduce extra vulnerabilities into the network infrastructure has reached a critical level.</p>
<p>In 2012, <a href="http://www.gfi.com/blog/labs">GFI Labs</a> found that hackers were moving from exploiting vulnerabilities in operating systems to exploiting third-party applications, such as Java® and Adobe®. GFI’s research shows that 75 percent of attacks now target vulnerabilities within these applications, making patch management absolutely critical for a layered security approach.</p>
<p>GFI LanGuard combines vulnerability scanning, patch management, and network and software auditing into one solution that enables IT professionals to scan, detect, assess and correct potential security risks on their networks with minimal administrative effort. GFI LanGuard also enables administrators to manage 100 percent of their patching needs on more than 2,500 machines from a single console; inventory devices attached to their networks; receive change alerts, such as notification when a new application is installed; ensure antivirus applications are current and enabled; and strengthen compliance with industry regulations through automated patch management that defends against potential network vulnerabilities. GFI LanGuard performs more than 50,000 checks against operating systems, applications, and devices, integrating with more than 2,500 security applications.</p>
<h3><em><strong>Learn more about</strong></em><strong> </strong><strong><em><a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13558&amp;loc=9">GFI LanGuard 2012</a> <em>or start your</em></em></strong><strong> </strong><em><strong><a href="http://landlanss.gfi.com/network-scan-sm/?adv=13558&amp;loc=23"><em>30-day trial</em></a></strong></em><em><strong> </strong></em><em><strong>today!</strong></em></h3>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-languard-now-supports-mac-os-x/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Six Tips to Shop Securely on Cyber Monday</title>
		<link>http://www.gfi.com/blog/six-tips-to-shop-securely-on-cyber-monday/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=six-tips-to-shop-securely-on-cyber-monday</link>
		<comments>http://www.gfi.com/blog/six-tips-to-shop-securely-on-cyber-monday/#comments</comments>
		<pubDate>Mon, 26 Nov 2012 15:01:20 +0000</pubDate>
		<dc:creator>David Kelleher</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Cyber Monday]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Protect Personal Information]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strong Passwords]]></category>
		<category><![CDATA[VIPRE]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9909</guid>
		<description><![CDATA[Cyber Monday: With consumers spending up to $1 bn in online sales on Black Friday (the day after Thanksgiving), they are expected to begin round two today as they look for more great bargains and knock a few more items off &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/11/Cyber-Monday-Online-Shopping.jpg"><img class="alignright size-medium wp-image-9913" style="border: 0px solid black; margin: 10px;" title="Cyber Monday Online Shopping" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/Cyber-Monday-Online-Shopping-200x300.jpg" alt="" width="200" height="300" /></a>Cyber Monday: With consumers spending up to $1 bn in online sales on Black Friday (the day after Thanksgiving), they are expected to begin round two today as they look for more great bargains and knock a few more items off their holiday shopping list.</p>
<p>Online shopping is great, but if you’re not careful, you could be the recipient of a lot more than you bargained for. Today is a feast day for hackers as they step up their efforts to trick and defraud online shoppers.</p>
<p>You may encounter legitimate websites that have been compromised and are delivering malware. Hackers have been doing a lot of background work to poison search engine results (a method known as SEO poisoning) for keywords such as “Cyber Monday Sales”, “Coupons”, and other attractive terms people search for related to the day. In these instances, cybercriminals are trying to get you and others to click on one of the top links in Google and other search engines and redirect you to a website that is hosting malware.</p>
<p>Phishing attacks aimed at mobile platforms, compromised websites serving up drive-by downloads, and shady campaigns on popular social networking sites (such as Tumblr, Twitter and Facebook), will all be things you should be mindful of when shopping online. Tactics are not limited to one platform alone, so you can be at risk even when using your phone or tablet. No platform is safe or malware-proof.</p>
<p>Here are some security tips to consider while shopping online today:</p>
<h2>1. Secure your PC, network and devices</h2>
<p>Be sure the computer you use has, at a minimum, a firewall, up-to-date antivirus software and the latest version of whichever web browser you are running. At home, ensure your wireless network is password-protected. If you must shop online in a public place, avoid using an unsecured Wi-Fi connection. If you have a smartphone, download an antivirus and antimalware app for it.</p>
<h2>2. Use strong passwords</h2>
<p>A strong, alphanumeric password with at least eight characters is an easy way to help defend your personal information online. It is also recommended that you use different user names and passwords for each online account you have.</p>
<h2>3. Shop on trusted, secure websites</h2>
<p>Before entering your personal financial information to make a transaction, always make sure that you are using a site that provides encryption for the credit card transaction. Look for the closed padlock on the browser’s address bar or at the bottom of the screen. Also check the browser’s address bar to confirm that the URL begins with “https”, signifying a secure site that provides encrypted communication. When using your smartphone, pay attention to what information a site or app is requesting.</p>
<h2>4. Protect personal information</h2>
<p>Most online shopping will require disclosing information to process a transaction. It is normal to provide contact information like an address and phone number, and, when prompted, your credit card number. However, be wary of any request for additional information, especially if it is received by email claiming to confirm a purchase or asking for additional information. Always contact the merchant directly if you have any doubt about requests for personal information you receive. When using your smartphone, pay attention to what information a site or app is requesting.</p>
<h2>5. Be careful what you click</h2>
<p>While searching online for deals and product reviews, be careful about clicking on hyperlinks you run across in search engine results and holiday e-cards, as well as on social networking sites like Twitter and Facebook, even if it appears that your friends are suggesting a link for you. Always verify the URL address—especially shortened URLs—of any link you run across to ensure it will direct you to a safe, reputable website. One wrong click can lead to malware that could end your holiday shopping season early.</p>
<h2>6. Is your software up-to-date?</h2>
<p>Cybercriminals have shifted their attack from Windows to third-party applications like Java or Adobe. Out-of-date (unpatched) versions of these programs have vulnerabilities that are found with exploit kits to get malware running. The shift has been so dramatic that over 75% of infections today use this attack vector. This problem of out-of-date software is so widespread, over 50% of all Windows-based computers are wide-open to this type of attack. Check your software products regularly and run updates regularly, especially third-party products. You can also automate the process using <a href="http://www.vipreantivirus.com/VIPRE-internet-security/">VIPRE Internet Security 2013</a>, the first AV product to have integrated patch management.</p>
<p>Have a great Cyber Monday but please be careful and think twice before visiting sites that look risky or you have never seen before. Better safe than sorry.</p>
<p><em>Don’t miss your chance to <a href="http://www.vipreantivirus.com/promos/black-friday/">save up to 75%</a> on VIPRE antivirus software for home PCs. Prices as low as $9.99! </em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/six-tips-to-shop-securely-on-cyber-monday/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 21:34:00 by W3 Total Cache --