Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

Secrets to installing a safe server

Secrets to installing a safe server

on June 11, 2010

Installing a server is something a lot of people undertake today. Whether you’re a student, administrator or IT professional, it is very likely that one day or another you’ll need to install a server which will be exposed to the …

Read the Full Story
0
Event Monitoring – An Overview (Part 2 of 2)

Event Monitoring – An Overview (Part 2 of 2)

on June 2, 2010

In the previous blog post we looked at the importance of event logs and all the useful information that event logs provide us with. How does one access these logs? Windows Events As stated previously on the windows platform the …

Read the Full Story
0
Event Monitoring – An Overview (Part 1 of 2)

Event Monitoring – An Overview (Part 1 of 2)

Since the dawn of the computer age, computing has been all about the interaction between man and the machine. In the beginning communication with a machine was very limited relying on complex mechanisms such as the punch card but as …

Read the Full Story
0
Cloud computing – Security Implications: Compliance

Cloud computing – Security Implications: Compliance

on June 1, 2010

In the previous articles on cloud computing we considered the security implications in choosing a provider as well as what needs to be done to have security in the cloud. Next we will discuss what cloud computing means to our …

Read the Full Story
6
Cloud computing – Security Implications: The Client Perspective

Cloud computing – Security Implications: The Client Perspective

on May 24, 2010

In the previous article on cloud computing we considered what to look for and what questions to ask security wise when looking for a cloud service provider. In this article we’ll look at what steps we can take to ensure …

Read the Full Story
2
Cloud computing – Security Implications: The Service Provider

Cloud computing – Security Implications: The Service Provider

on May 21, 2010

One does not need a crystal ball to deduce that cloud computing will be the next big thing and because of this there needs to be some re-thinking of a company’s security strategy in order to safeguard the company data. …

Read the Full Story
2
Securing your environment from the threats you actually paid for

Securing your environment from the threats you actually paid for

on May 11, 2010

Every business IT infrastructure requires tools. Obviously no one company develops every tool it needs in-house and at one time or another every company will end up buying software. Sometimes we take the software we buy for granted and this …

Read the Full Story
2
The Importance of an Effective ITIL Change Management Process

The Importance of an Effective ITIL Change Management Process

on May 10, 2010

Technology and the IT infrastructure are constantly changing and advancing. This means that at some point a company will need to go through a change management process to keep up to date with the latest technologies.

Read the Full Story
3
Who’s watching the watchers?

Who’s watching the watchers?

on May 6, 2010

Security has a bit of a dark side. When people are given power over other people there often seems to be the urge to abuse that power.  We have previously covered the scandal in which a school used webcams on …

Read the Full Story
2
Protecting your employees from themselves

Protecting your employees from themselves

on May 5, 2010

Scams are getting bolder and more intelligent all the time. Recent the BBC broke a story about a new scareware malware which exploits people looking for pornography. The malware which masquerades as a pornographic game once downloaded and run takes …

Read the Full Story
2