SMB Zone

When hacking gets personal

Hackers known as the Guardians of Peace breached Sony Pictures Entertainment’s network, gaining unprecedented access to essentially everything. What are the lessons learned here?

Continue reading

In the tech industry, timing is everything

There are many other aspects that contribute to whether a company’s offering with be a big success or a dismal flop, but whether or not the time is right seems to be the most important of all.

Continue reading

Customer to tech companies: Stop abandoning your babies

Discontinuation of a trusted product feels like a betrayal, and there’s a good chance that customer will think twice before investing money and time in one of that company’s products again.

Continue reading

E-cigarettes chargers: not what they seem?

Hackers are purportedly bundling malware onboard with USB chargers so that, when users connect them to their computers to charge their e-cigarettes, they get more than a nicotine hit.

Continue reading

Employee Internet monitoring is really a process of discovery

Employee Internet monitoring is a discovery tool that enables the IT admin to properly manage and secure the network from the bad guys.

Continue reading

‘Not just email archiving’ – Introducing, GFI Archiver 2015

GFI Archiver 2015, a rebranded and updated version of GFI MailArchiver, is available today and we asked its product manager, Ian Bugeja, to tell us why the product has been rebranded and what’s new in this version.

Continue reading

Study: 38.6% of U.S. businesses suffer IT failures caused by non-work related Internet use

A survey by GFI Software issued today takes an independent look into how workers use company-provided computers and laptops for personal activities, and the direct impact that personal use can have on the organization.

Continue reading

In cyberspace, no one can hear your router scream

According to your bandwidth bills, a black hole is a region of the Internet from which cat videos, check-ins, and likes prevent anything, including productivity, from escaping. Let’s take a closer look at some of the black holes that threaten your users and data from cyberspace, and how you can protect your users from them.

Continue reading

Have wireless, will travel

In this article, we’ll take a look at some of the technological innovations that are making travel a little more pleasant.

Continue reading

Antivirus is not a replacement for patch management software

While antivirus software is absolutely critical and has its proper place in your network, it’s no substitute for patch management software. Using both will help to bolster your defenses and is a good start towards that layered security approach.

Continue reading

Find us on Facebook

Follow us on Twitter