SMB Zone

Study: 38.6% of U.S. businesses suffer IT failures caused by non-work related Internet use

A survey by GFI Software issued today takes an independent look into how workers use company-provided computers and laptops for personal activities, and the direct impact that personal use can have on the organization.

Continue reading

In cyberspace, no one can hear your router scream

According to your bandwidth bills, a black hole is a region of the Internet from which cat videos, check-ins, and likes prevent anything, including productivity, from escaping. Let’s take a closer look at some of the black holes that threaten your users and data from cyberspace, and how you can protect your users from them.

Continue reading

Have wireless, will travel

In this article, we’ll take a look at some of the technological innovations that are making travel a little more pleasant.

Continue reading

Antivirus is not a replacement for patch management software

While antivirus software is absolutely critical and has its proper place in your network, it’s no substitute for patch management software. Using both will help to bolster your defenses and is a good start towards that layered security approach.

Continue reading

The 21 secrets of email signature bliss

Doing email signatures the right way can be a challenge for many companies, so here are some tips to help you with email signature etiquette and effectiveness.

Continue reading

Seven reasons why online faxing is good for healthcare providers

Online faxing is growing in popularity among healthcare providers as more and more doctors’ offices, hospitals and labs start to see just how easy it is to integrate, and how much time, effort and money it saves them.

Continue reading

Controlling Internet access at the application layer

You want to permit your users to access the web and all the good it has to offer, but you need to protect your users, your business, and your customers from all the bad. What do you do?

Continue reading

Clever phishing attack uses Dropbox to spoof Dropbox

Dropbox recently detected and shut down a spoofing page designed to grab users’ credentials to Dropbox and other webmail based systems that was hosted on Dropbox itself.

Continue reading

Play ball! But make sure critical apps don’t strike out

As users go looking for the plays of the day, interviews with the players, and perhaps even the odds for the next game, you need to make sure that their enthusiasm for the game doesn’t cause productivity issues, or worse, prevents critical business apps from functioning.

Continue reading

Take our mini quiz and win a subscription license of GFI WebMonitor 2015

To follow up the launch of GFI WebMonitor 2015, we are giving five techies the chance to win a 10-user, one-year subscription licence of GFI WebMonitor.

Continue reading

Find us on Facebook

Follow us on Twitter