Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Mohammed S Ali

Beware the Malware Banner

Beware the Malware Banner

on May 24, 2011

Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …

Read the Full Story
4
Tips for a Good Patch Management Strategy

Tips for a Good Patch Management Strategy

on May 20, 2011

Previously “Never touch a running system” was a very common tradition/saying in IT administration. Once software is installed on a system, it will be never touched again as long as software does the job properly. Nowadays, this common tradition has …

Read the Full Story
4
How to Detect Network Intruders (Part 2)

How to Detect Network Intruders (Part 2)

on April 21, 2011

In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client …

Read the Full Story
4
How to Detect Network Intruders (Part 1)

How to Detect Network Intruders (Part 1)

on April 18, 2011

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …

Read the Full Story
6
How End Point Security Software Can Prevent Data Theft

How End Point Security Software Can Prevent Data Theft

on April 4, 2011

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …

Read the Full Story
3
4 Reasons for Implementing Patch Management Software

4 Reasons for Implementing Patch Management Software

on March 21, 2011

Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …

Read the Full Story
4
How Events Monitoring can Prevent IT Disasters (Part 3)

How Events Monitoring can Prevent IT Disasters (Part 3)

on March 14, 2011

In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …

Read the Full Story
2
How Events Monitoring can Prevent IT Disasters (Part 2)

How Events Monitoring can Prevent IT Disasters (Part 2)

on March 8, 2011

In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …

Read the Full Story
3
How Events Monitoring can Prevent IT Disasters (Part 1)

How Events Monitoring can Prevent IT Disasters (Part 1)

on March 4, 2011

An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …

Read the Full Story
3
Why FAX is still an essential element in corporate environments

Why FAX is still an essential element in corporate environments

on November 15, 2010

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …

Read the Full Story
2