SMB Zone

Whose airwaves are they, anyway?

How do you balance private property rights with the right to use those public airwaves no matter where you are?

Continue reading

Insider threats are alive and very (un)well

What should a company do when users, whose roles require access to sensitive data, misuse that access? What precautions can companies take to reduce both the risk of this happening, and the damage that can result from insider activity?

Continue reading

Introducing GFI MailEssentials 2015

GFI MailEssentials 2015 is available today. Product manager, Ian Bugeja, tell us what’s new in this version.

Continue reading

The dangers of unintentional web requests and hidden social media

Learn how GFI WebMonitor can strengthen your web security by distinguishing between direct and indirect web requests.

Continue reading

Closing loopholes in web filtering solutions

Combining web filtering with endpoint security makes sense for any company looking to deploy a layered defense and ensure that they are protecting their users, their customers and their corporate resources as thoroughly as they can.

Continue reading

The 12 technologies for the holidays

If you’re looking to spend the last big of this year’s budget, you would be doing yourself (and the company) a huge favor by investing in one of the 12 technologies listed below.

Continue reading

When hacking gets personal

Hackers known as the Guardians of Peace breached Sony Pictures Entertainment’s network, gaining unprecedented access to essentially everything. What are the lessons learned here?

Continue reading

In the tech industry, timing is everything

There are many other aspects that contribute to whether a company’s offering with be a big success or a dismal flop, but whether or not the time is right seems to be the most important of all.

Continue reading

Customer to tech companies: Stop abandoning your babies

Discontinuation of a trusted product feels like a betrayal, and there’s a good chance that customer will think twice before investing money and time in one of that company’s products again.

Continue reading

E-cigarettes chargers: not what they seem?

Hackers are purportedly bundling malware onboard with USB chargers so that, when users connect them to their computers to charge their e-cigarettes, they get more than a nicotine hit.

Continue reading

Find us on Facebook

Follow us on Twitter