Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: David Kelleher

About David Kelleher

David Kelleher is Director of Public Relations at GFI Software. With over 20 years’ experience in media and communications, he has written extensively for business and tech publications and is an editor and regular contributor to Talk Tech to Me.

Mind that password… again

Mind that password… again

on October 16, 2009

Last week I commented on the phishing attack that resulted in more than 10,000 passwords being leaked online. An analysis of the passwords showed that many computer users are more concerned with choosing a password that they can remember rather …

Read the Full Story
2
Mind that password

Mind that password

on October 8, 2009

The phishing attack that led to more than 10,000 Hotmail, MSN and Live.com passwords being exposed online earlier this week has provided an interesting glimpse into the mindset of email users when setting up their accounts. A researcher who managed …

Read the Full Story
4
Scareware on the increase

Scareware on the increase

on October 6, 2009

A report by the Antiphishing Working Group this week reveals that the number of people downloading and installing rogue anti-virus programs is on the rise with one security company claiming that cybercriminals were making up to $34 million a MONTH …

Read the Full Story
2
GFI Software acquires hosted email filtering company Katharion

GFI Software acquires hosted email filtering company Katharion

on October 1, 2009

We are pleased to announce the acquisition of Los Angeles-based hosted email filtering company Katharion. Through this acquisition, we will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. “This is the next step …

Read the Full Story
0
GFI Software wins five Best Channel Product 2009 Awards

GFI Software wins five Best Channel Product 2009 Awards

on September 2, 2009

We are delighted and proud to have received five awards in the Best Channel Products Awards organized by Business Solutions Magazine. GFI rated exceptionally well in the Network Security category and very high in terms of ease of upgrade and VARs’ ability to service …

Read the Full Story
0
People do reply to email spam

People do reply to email spam

on August 12, 2009

I sometimes wonder how spammers can be so successful in what they do. They send out millions of emails every day promising the world – get rich offers, a pile of cash waiting just for you to claim ownership, pills …

Read the Full Story
1
Security policies: making them work for you – Part 2

Security policies: making them work for you – Part 2

on July 16, 2009

In the first of this two part article, the discussion centered around the creation of IT security policies and why there often is strong resistance to their existence and implementation. Successfully implementing IT security polices goes beyond the technology and …

Read the Full Story
0
Security policies: making them work for you – Part 1

Security policies: making them work for you – Part 1

on July 10, 2009

Every organization has its own rule book or set of procedures that management or HR expects employees to follow religiously. These ‘rules’ stipulate when employees are to start and finish work; when they can take their lunch break or how …

Read the Full Story
0
Security awareness: taking the first steps

Security awareness: taking the first steps

on July 3, 2009

In a previous post, I talked about the importance of security education and awareness programs for employees. If you are an IT administrator or a business owner reading this blog you may feel that in theory this is great and makes sense, …

Read the Full Story
0
Security education: ineffective or the wrong approach?

Security education: ineffective or the wrong approach?

on June 30, 2009

Employees don’t give two hoots about security or security policies. They share passwords with colleagues; they share work devices with others without supervision; they transfer files from their laptop to home computer; they use their corporate email address to subscribe …

Read the Full Story
2