Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

How to limit Internet access on the network

How to limit Internet access on the network

on July 8, 2011

There are several reasons why you need to limit Internet access on the network. Perhaps your company is experiencing a problem with individuals’ productivity. Or Human Resources has determined that there is an issue with certain employees’ web access. Maybe …

Read the Full Story
5
Trade Secrets and Intellectual Property

Trade Secrets and Intellectual Property

on July 5, 2011

There are different objectives behind malware and hacking attacks, and one of the primary reasons is obviously financial gain. The methods malicious hackers use to achieve financial gain have over time changed and evolved. In the past, this activity centered …

Read the Full Story
6
The Insidious Insider Threat!

The Insidious Insider Threat!

on June 30, 2011

In security we often preach that insider threats are generally the worst. When the attacker is one of your own the challenge to keep your systems safe becomes a lot harder. This is because you effectively tell your staff what …

Read the Full Story
6
The Importance of Deploying a Patch Management Process

The Importance of Deploying a Patch Management Process

on June 3, 2011

Patching systems is often seen as a simple task but there is more to the patch management process than meets the eye. You don’t just get the patches and deploy them but you need to start planning and testing before …

Read the Full Story
4
What Should Be Included In Your Patch Management Policy?

What Should Be Included In Your Patch Management Policy?

on June 2, 2011

Most organizations pay attention to security and patching their systems, but how many have a well-honed patch management policy? Patch management is often seen as a trivial task. Simply click on ‘update’ and that’s it. But in reality there is …

Read the Full Story
3
Why your organization needs to do network auditing

Why your organization needs to do network auditing

on June 1, 2011

Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware …

Read the Full Story
6
Why You Need to Run a Vulnerability Assessment

Why You Need to Run a Vulnerability Assessment

on May 31, 2011

Running a vulnerability assessment is fundamental for any organization. When an administrator is in the process of securing his network, there are a lot of things he needs to bear in mind. Unfortunately, when it comes to network security most …

Read the Full Story
10
Beware of Breaking News

Beware of Breaking News

on May 6, 2011

Malware writers and people who make money off the distribution of malware have always had one tricky element to their operation – getting the user to act in such a way which gets him/her infected. Throughout the years one approach …

Read the Full Story
3
Why the Need for Internet Monitoring?

Why the Need for Internet Monitoring?

on April 11, 2011

There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for …

Read the Full Story
4
Explaining Botnets

Explaining Botnets

on April 7, 2011

If one were to ask people, ‘What is the most annoying thing they experience on the internet?’ it’s safe to assume that most will name spam as their No. 1 annoyance. The main driver for spam is obviously money. People …

Read the Full Story
5