Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

How to Control Cyber Slacking

How to Control Cyber Slacking

on August 20, 2010

Cyber slacking is a term used when employees use their work internet connection for personal reasons for excessive amounts of time. Cyber slacking can cause a number of problems, from the obvious loss of productivity to legal liability as well …

Read the Full Story
7
Internet Monitoring: How, what, why?

Internet Monitoring: How, what, why?

on July 29, 2010

Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored.  To top it all off …

Read the Full Story
6
Unbelievable Security Stories

Unbelievable Security Stories

on July 22, 2010

I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …

Read the Full Story
10
10 Tips to Avoid Spam

10 Tips to Avoid Spam

on July 7, 2010

Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …

Read the Full Story
9
Is Privacy Dead?

Is Privacy Dead?

on June 28, 2010

With the advent of the internet many people seem to forget about privacy and its importance.  Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …

Read the Full Story
12
Do you know the dangers of wireless networks?

Do you know the dangers of wireless networks?

on June 24, 2010

I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …

Read the Full Story
7
Top 10 Security Precautions when using Social Networking Sites

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

Read the Full Story
13
How to secure your network the old fashioned way

How to secure your network the old fashioned way

on June 18, 2010

Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …

Read the Full Story
5
Top 5 Risks caused by employees’ actions

Top 5 Risks caused by employees’ actions

on June 15, 2010

Employees generally do not mean to harm the organization for which they work; however, sometimes due to a lack of due diligence or even lack of education on security employees might pose a grave security risk to an organization. Below …

Read the Full Story
4
How to dispose of confidential data

How to dispose of confidential data

on June 14, 2010

Administrators know the importance of keeping confidential data confidential but sometimes a small lapse can turn the enforcer into the perpetrator. Hardware gets old and needs to be replaced as does faulty hardware; however, what happens to the old stuff? …

Read the Full Story
6