<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; SMB Zone</title>
	<atom:link href="http://www.gfi.com/blog/category/tttm/smb-zone/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Layered Security: Essential for a Safe Company Network</title>
		<link>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=layered-security-essential-for-a-safe-company-network</link>
		<comments>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/#comments</comments>
		<pubDate>Fri, 13 Sep 2013 15:57:52 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[blackhole exploit kit]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[layered security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware as a service]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[viruses]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10867</guid>
		<description><![CDATA[Long gone are the days when system security was about little more than choosing an effective antivirus product. Threats to IT security now come from several different angles, and companies wishing to avoid the costs and reputational damage associated with &#8230;]]></description>
				<content:encoded><![CDATA[<div id="attachment_9396" class="wp-caption alignright" style="width: 345px"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/09/david-attard.jpg"><img class=" wp-image-9396     " alt="David Attard, Product Manager for GFI WebMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2012/09/david-attard.jpg" width="335" height="223" /></a><p class="wp-caption-text">David Attard, Product Manager for GFI WebMonitor</p></div>
<p>Long gone are the days when system security was about little more than choosing an effective antivirus product.</p>
<p>Threats to IT security now come from several different angles, and companies wishing to avoid the costs and reputational damage associated with security breaches must take a multi-faceted approach.</p>
<p>In this article, we speak to David Attard, a GFI product manager specializing in Web security, about the threats facing modern, connected businesses.<span id="more-10867"></span></p>
<h2>How has the IT security landscape changed in recent years?</h2>
<p>The biggest change has been a move away from traditional viruses and Trojans. Of course these still exist, and there are multitudes of them, but some of the scariest threats nowadays are those posed by social engineering and phishing, which take advantage of user naivety rather than holes in an infrastructure. Moreover, malware is pushed aggressively to victims. Rather than a chance encounter with a virus on a dodgy website, even the most educated and wary of users are likely to encounter malware being pushed to them via what is perceived as “normal” web browsing such as search engines, news and social networking sites.</p>
<p>Also, there are various downloads which are likely to contain malware. Research by Microsoft suggests that 1 in 14 downloads is actually malicious.</p>
<h2>How should IT departments respond to this?</h2>
<p>It’s now essential that companies take a multi-layered view of IT security. At the top level, this means doing all you can to prevent users accessing compromised areas of the Web by using content filtering &#8211; but it shouldn’t stop there.</p>
<p>If users <i>are</i> able to inadvertently access a malware-infected site, companies need to know that their machines are sufficiently patched and protected to prevent hackers taking advantage of exploits.</p>
<p>Finally, businesses need to ensure that other routes into the network are protected; there’s no point in having perfect Web security if a user can introduce malware by plugging in an infected USB stick or connecting their personal laptop or other device to the network without any mitigating security practices in place.</p>
<h2>Do businesses have good reason to be alarmed by how malware is evolving?</h2>
<p>If they’re not protected at every level, then definitely. Phishing is a particular concern, as compromised sites can look so genuine that they fool a large proportion of people. Obviously the ideal scenario is to use software that protects users from being tricked in the first instance, but user education is clearly very important too.</p>
<p>You only have to look at how many high-profile Twitter accounts have been hacked to know how real this threat is. The Syrian Electronic Army compromised many accounts with targeted phishing emails that convinced people sufficiently to give up their credentials.</p>
<h2>Do SMEs need to worry as much as larger companies?</h2>
<p>Yes, <span style="text-decoration: line-through;">because (arguably)</span> they are easier targets, with smaller budgets for IT security and it is essentially a game of numbers. Create large scale scatter shot and many victims are bound to get caught in the crossfire. We are also seeing a trend towards Advanced Persistent Threats (APTs), where hackers persistently target a company with a range of different attacks, including social engineering, in an attempt to gain system access.</p>
<p>Once they’re in there’s plenty they can do. Hackers can even access “malware as a service” such as the Blackhole Exploit Kit, which effectively allows them to design and distribute malware to meet their own ends with very little effort and at a very cost-effective price.</p>
<h2>What’s the best advice you could give to an IT department concerned about these issues?</h2>
<p>Use a product such as <a href="https://www.gficloud.com/land/gfi-cloud-unified?adv=13558&amp;loc=53 ">GFI Cloud</a> that can integrate patch management, antivirus and from early October, content filtering in one easy to use, web-based console. Only by thinking of every possible “way in” can IT professionals really sleep soundly at night!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Patch Management Made Easy!</title>
		<link>http://www.gfi.com/blog/patch-management-made-easy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=patch-management-made-easy</link>
		<comments>http://www.gfi.com/blog/patch-management-made-easy/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 14:00:26 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Automated Software Patching]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Based Patch Management]]></category>
		<category><![CDATA[Cloud Solutions]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT resources]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[web-based interface]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10848</guid>
		<description><![CDATA[Any system admin worth their salt knows that the time-consuming process of installing new software is only the tip of the iceberg. The real drain on your IT resources comes from managing and administering that software. Why? Because effective patch &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Patch-Management-Cloud.jpg"><img class="wp-image-10849 alignright" style="border: 0px solid black; margin: 10px;" alt="Patch Management Cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Patch-Management-Cloud.jpg" width="216" height="216" /></a>Any system admin worth their salt knows that the time-consuming process of installing new software is only the tip of the iceberg. The real drain on your IT resources comes from managing and administering that software.<span id="more-10848"></span></p>
<p>Why? Because effective patch management is an essential component for the maintenance of a safer network. Unpatched software and operating systems can have vulnerabilities which in turn can be exploited during a malicious attack on your system.</p>
<p>2012 saw a total 4,347 new security vulnerabilities reported, that’s around 12 every day that system admins need to be aware of and repair across an entire network.  And with more and more employees bringing their own devices to plug in to business networks, the risk is even greater.</p>
<p>So, if patch management is essential, how can you handle it more efficiently?</p>
<h2>The Evils of Automated Software Patching</h2>
<p>Yes, it is true that almost every application now comes with automated patch management. However, relying on this method to keep your software updated could leave you exposed. Automated services require a user to be connected to the Internet and to accept the installation of the update, rather than skipping it.</p>
<p>Can the onus be put onto users to take care of their own machines?</p>
<p>A Skype survey of US, UK and German consumers showed that 40% of respondents don&#8217;t update their machines when prompted. Almost 25% required a second prompt. Around 45% were actually worried that installing the update would weaken their computer&#8217;s security.</p>
<p>To counter this system admins must check each machine individually to ensure they are all patched and running the latest software versions. That is a hugely resource-intensive for small IT departments and virtually impossible for a single person to accomplish.</p>
<p>On occasion, some patches may cause instability in a machine. The Microsoft MS10-015 patch for Windows XP that was released in February 2010 is one great example. It caused systems to crash and the patch was suspended. Just last month,  the MS-13-061/KB2876216 update caused corruption of the Exchange index database,  and the  KB 2843638, 2843639 and 2868846 caused the Active Federation Services (ADFS) to stop working. Workarounds and additional install instructions were issued for the problematic patches &#8211; but how many users know how to roll back patches? And how many will even realize they installed a patch in the first place?</p>
<p>That adds up to even more work for already busy IT managers.</p>
<h2>Cloud-Based Patch Management</h2>
<p>GFI Cloud™ is a simple web-based interface for integrated antivirus, asset tracking, network monitoring and remote control.</p>
<p>Using a cloud-based patch management system offers you a wide range of advantages. Firstly, it provides you with a single, central point of control. There is no more hunting around machines to see which one is patched and which one is not. You get a single interface that collects and collates that information for you.</p>
<p>You can patch machines from the console, which removes the need for users to make decisions. That enables you to patch machines faster and ensure that vulnerabilities are kept to a minimum.</p>
<p>Even better, cloud solutions are scalable so they can grow with your needs. Perhaps most importantly, they are also cost effective and won&#8217;t require you to upgrade your machines to run. You can deploy the solution within minutes and quickly get clear insight in to the status of your network.</p>
<p><b><i>Try GFI Cloud patch management <a href="http://www.gficloud.com/land/new-patch-management/?adv=13558&amp;loc=56">free for 30 days.</a></i></b><b><i></i></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/patch-management-made-easy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI MailArchiver App for Windows 8</title>
		<link>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailarchiver-app-for-windows-8</link>
		<comments>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 13:27:36 +0000</pubDate>
		<dc:creator>Kate Bolton</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10858</guid>
		<description><![CDATA[According to IDC, tablet sales are going to supersede laptop sales in 2013 and “the entire PC market by 2015”. This means that apps can no longer be designed in the traditional way with a title bar, menu bar and desktop &#8230;]]></description>
				<content:encoded><![CDATA[<p>According to <a href="http://news.cnet.com/8301-1035_3-57586388-94/tablet-shipments-to-surpass-all-pcs-by-2015-idc-says/">IDC</a>, tablet sales are going to supersede laptop sales in 2013 and “the entire PC market by 2015”.</p>
<p style="text-align: center;"><img class="wp-image-10859 aligncenter" alt="shot1" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/shot1.jpg" width="470" height="294" /></p>
<p>This means that apps can no longer be designed in the traditional way with a title bar, menu bar and desktop approach. Apps have to be tailored for touch and be able to run from tablets. Windows 8 has brought about a new way of looking at apps. The new modern interface’s tiles and buttons are literally asking the user to touch and press them.</p>
<p>The new interface has not been to everyone’s liking and many have complained and expressed their frustration, but it’s a whole new set of ideas and users need to adjust to them to fully understand their potential. But once you get used to tablets you understand why it’s more natural to press a button with your finger than to move the mouse and click on it.</p>
<p>At GFI we always strive to keep up to date with new technologies and today we are releasing our first Windows 8 Modern UI app. This app for GFI MailArchiver makes it possible to connect to your email archive from your Windows 8 tablet/PC or your Windows RT tablet.  This adds to the different apps and methods that you can use to connect to GFI MailArchiver to browse and search the archive.</p>
<p>The app makes it very easy to search and browse the archive. We have also made it simple to search for the people you communicate with the most, or to save your own custom searches. <a href="http://apps.microsoft.com/windows/app/gfi-mailarchiver/a9cf75a8-7d7e-4f2a-af44-ca316548e3c2">Why not check it out?</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are You Ready for 2014? GFI LanGuard® 2014 Is!</title>
		<link>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-ready-for-2014-gfi-languard-2014-is</link>
		<comments>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/#comments</comments>
		<pubDate>Tue, 10 Sep 2013 11:14:13 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[GFI LanGuard 2014]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[network administrators]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10851</guid>
		<description><![CDATA[We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&#38;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release. Q: How is GFI LanGuard adapting to the changes that &#8230;]]></description>
				<content:encoded><![CDATA[<p><i><br />
We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&amp;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release.<span id="more-10851"></span></i></p>
<h2><b>Q: How is GFI LanGuard adapting to the changes that happen so fast in the IT infrastructure landscape nowadays?</b></h2>
<div id="attachment_10852" class="wp-caption alignright" style="width: 317px"><a style="color: #ff4b33;" href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg"><img class="wp-image-10852 " alt="Cristian Florian" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg" width="307" height="197" /></a><p class="wp-caption-text">Cristian Florian, Product Manager for GFI LanGuard</p></div>
<p>IT environments now include so many different devices, operating systems and applications that network administrators may not even be aware of all of them. The rise in BYOD (Bring Your Own Device) in business environments has added to the burden system administrators have to carry every day, in turn forcing them to stay on top of their network environment, strengthen security, while also monitoring an ever-changing network infrastructure.</p>
<p>So we built GFI LanGuard 2014 with this in mind. We had to extend its capability in this new environment because the whole IT infrastructure needs to be managed, no matter if we are talking about Windows®, Mac OS® or Linux® systems, physical or virtual machines, servers, desktops, laptops, mobile devices such as smartphones and tablets, or network devices such as routers, switches and printers.</p>
<h2><b>Q: What is new in GFI LanGuard 2014?</b></h2>
<p>One of the major things we added in GFI LanGuard 2014 is vulnerability assessment for smartphones and tablets. According to a <a href="http://www.ciscomcon.com/sw/swchannel/registration/internet/registration.cfm?SWAPPID=91&amp;RegPageID=350200&amp;SWTHEMEID=12949&amp;traffictype=Direct" target="_blank">survey conducted by Cisco</a>, 90 percent of American employees use their personal smartphone for work purposes. While this is an opportunity for businesses, it also adds risk, as these devices may have access to sensitive company information and there is little, if any, visibility into how security is managed for them.</p>
<p>GFI LanGuard now allows network administrators to see when and what devices connect to the Microsoft Exchange servers and it checks these devices for security vulnerabilities. Android®, iOS® and Windows Phone® are supported. Additionally GFI LanGuard will report when new mobile operating systems updates are available and makes it very easy for network administrators to send email notifications to device owners alerting them that these updates are available.</p>
<h2><b>Q: How does vulnerability assessment for mobile devices work? Do network administrators need to install anything on the smartphones?</b></h2>
<p>No. Auditing of smartphones and tablets using GFI LanGuard is very easy. Mobile devices that connect to the company’s Microsoft Exchange servers are detected using agent-less scans. There is nothing to install on smartphones, tablets or the Microsoft Exchange server.</p>
<p>The only thing that needs to be set is the Microsoft Exchange server name and credentials that have access to it.</p>
<h2><b>Q: Are there any enhancements on the patch management side?</b></h2>
<p>Yes. We are continuously improving our patch management capabilities. GFI LanGuard 2014 comes with patch management support for major Linux distributions such as Red Hat Enterprise Linux, Ubuntu, Suse, OpenSuse, CentOS and Debian.</p>
<p>According to <a href="http://whitepapers.theregister.co.uk/paper/view/2932/the-end-user-security-jigsaw.pdf" target="_blank">a recent survey from Freeform Dynamics Ltd</a> on 977 IT and business professionals representing a range of organization sizes and industries, 62.6% of them have at least one Linux system in their organization.</p>
<p>Now customers can use GFI LanGuard as a central console to patch Windows, Mac OS and Linux operating systems and applications. And, speaking of applications, it is now easier than ever for IT administrators to keep their systems fully patched, as we added a host of third-party applications to our “supported list”.</p>
<h2><b>Q: What new third party applications are supported?</b></h2>
<p>We added support for more than 20 new applications, bringing the total to over 50 third-party applications (besides Microsoft applications). We are practically covering all the most important ones in terms of popularity and security relevance.</p>
<p>Among the new applications we support are Pidgin (instant messaging), CDBurnerXP, ImgBurn and CCleaner (utilities), VLC and Audacity (media), LibreOffice (documents), Paint.NET and  IrfanView (imaging), Adobe Illustrator, Adobe PhotoShop and Adobe InDesign (Adobe Creative Suite), WinSCP and Core FTP (FTP clients), Python and Notepad++ (developer tools). The complete list is available <a href="http://www.gfi.com/support/products/gfi-languard/KBID003469" target="_blank">here</a>.</p>
<p>We will continue to add support for new applications at a high rate. Customers can request support for additional applications by sending an email <a href="mailto:FeedbackLNSS@gfi.com" target="_blank">to this address</a>.</p>
<h2><b>Q: Anything else worth mentioning?</b></h2>
<p>Yes, we have some other good news for our customers. We have a special offer for anyone who purchases or upgrades their GFI LanGuard version to 2014. They will automatically receive 25% extra nodes for free to use exclusively on mobile devices auditing.</p>
<p><em><strong>So check out the new <a href="http://www.gfi.com/land/Home/adv/lanss/Scan-your-network-effortlessly?adv=13558&amp;loc=49" target="_blank">GFI LanGuard</a> version. We are proud of what we have accomplished and we believe that our users will enjoy it too.</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Porn in Parliament – Also in Your Office?</title>
		<link>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=porn-in-parliament-also-in-your-office</link>
		<comments>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/#comments</comments>
		<pubDate>Fri, 06 Sep 2013 12:00:46 +0000</pubDate>
		<dc:creator>David Attard</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[block categories]]></category>
		<category><![CDATA[Freedom of Information Act]]></category>
		<category><![CDATA[GFI WebMonitor]]></category>
		<category><![CDATA[Houses of Parliament]]></category>
		<category><![CDATA[Monitoring Internet activity]]></category>
		<category><![CDATA[porn]]></category>
		<category><![CDATA[Porn Parliament]]></category>
		<category><![CDATA[undesirable websites]]></category>
		<category><![CDATA[web browsing]]></category>
		<category><![CDATA[web browsing security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10818</guid>
		<description><![CDATA[It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/porn.jpg"><img class="alignright  wp-image-10819" style="border: 0px solid black; margin: 10px;" alt="porn" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/porn.jpg" width="288" height="190" /></a>It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, <a href="http://www.huffingtonpost.co.uk/2013/09/03/parliament-porn-websites_n_3859837.html" target="_blank">official figures released under the Freedom of Information Act</a> show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.<span id="more-10818"></span></p>
<h2><b>Why does this happen?</b></h2>
<p>It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge.</p>
<h2><b>What should you be thinking about?</b></h2>
<p>Even though employees in the Houses of Parliament probably had a good idea that their online activity was monitored, it didn’t prevent them from attempting to access adult material. Moving away from the topic of porn and MPs in the UK, and looking at matters closer to home, how can you prevent something similar from happening?</p>
<p>What can you do to make sure that your staff spend their time more efficiently and productively? Here are a few tips:</p>
<p>1)      First things first, if you don’t have a web filtering and monitoring system in place, then you really should implement one – unless you want to start wondering what each employee in doing online</p>
<p>2)      You need a web filtering solution which will allow you to drill-down exactly into what a specific user is doing, as given by example in this short video:  <a href="http://www.youtube.com/watch?v=gbWNLs4W5io" target="_blank">Monitoring Internet activity at the office</a>.</p>
<p>3)      Your web filtering should proactively advise and alert you when a user attempts to visit ‘naughty’ websites, or other illicit webpages, so that your HR department can decide whether or not to remind them of the company’s best practices on Internet usage.</p>
<p>4)      You should invest some time and resources discovering how much time users are spending on websites which are unrelated to their official duties.</p>
<p><a href="http://www.gfi.com/land/Home/adv/webmon/Get-advanced-web-filtering-for-your-business?adv=13558&amp;loc=50" target="_blank">GFI WebMonitor®</a> is an affordable solution that allows you to address all of the above. Besides the ability to block categories of undesirable websites, it is very easy to use the Activity dashboards and reports to identify employees whose time could be better spent working for you, than searching the web for themselves. Real-time configurable alerts allow you to send emails to the appropriate people when their online behaviour merits it. Search engine query monitoring, for example, will clearly show what a user’s intentions were and the appropriate department can take the necessary actions, including education, to ensure there are no repeat offenders. GFI WebMonitor offers companies many other benefits such as added web browsing security and mitigation of bandwidth issues.</p>
<p><em><strong><a href="http://www.gfi.com/land/Home/adv/webmon/Get-advanced-web-filtering-for-your-business?adv=13558&amp;loc=50" target="_blank">Try GFI WebMonitor for free for 30 days!</a></strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Gold Award for GFI Cloud™ – WindowsNetworking.com</title>
		<link>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gold-award-for-gfi-cloud-windowsnetworking-com</link>
		<comments>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/#comments</comments>
		<pubDate>Fri, 06 Sep 2013 10:29:57 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT network]]></category>
		<category><![CDATA[manage IT]]></category>
		<category><![CDATA[Windows XP]]></category>
		<category><![CDATA[WindowsNetworking.com]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10814</guid>
		<description><![CDATA[Here at GFI Cloud we love our product as much as our customers. Now, even the tough reviewers at WindowsNetworking.com are talking about GFI Cloud. The reviewer, Brien M. Posey, was impressed by the speed of install across a variety &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/WN_Gold_200x117.jpg"><img class="alignright size-full wp-image-10815" style="border: 0px solid black; margin: 10px;" alt="WN_Gold_200x117" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/WN_Gold_200x117.jpg" width="200" height="117" /></a>Here at GFI Cloud we love our product as much as our customers. Now, even the tough reviewers at WindowsNetworking.com are talking about GFI Cloud.<span id="more-10814"></span></p>
<p>The reviewer, Brien M. Posey, was impressed by the speed of install across a variety of windows systems and servers and the really nice reporting feature. “All in all, I liked GFI Cloud. I found it easy to use” (See full review <a href="http://www.windowsnetworking.com/articles-tutorials/product-reviews/product-review-gfi-cloud.html" target="_blank">here</a>).</p>
<p>WindowsNetworking.com reviewed and assessed of each of GFI Cloud’s features:</p>
<ul>
<li>Asset Tracking</li>
<li>Monitoring</li>
<li>Patch Management</li>
<li>Antivirus</li>
</ul>
<p>The result: GFI Cloud earned the WindowsNetworking.com Gold Award.</p>
<p>Sign up for your <a href="http://www.gficloud.com/land/simplify-your-it/?adv=13558&amp;loc=58">free 30 day trial</a> and experience how the GFI Cloud platform.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>September Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/september-webcast-line-up-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=september-webcast-line-up-2</link>
		<comments>http://www.gfi.com/blog/september-webcast-line-up-2/#comments</comments>
		<pubDate>Wed, 04 Sep 2013 14:00:09 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[Message management solutions]]></category>
		<category><![CDATA[Multi-layer IT security]]></category>
		<category><![CDATA[security solutions]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10795</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! Don’t be an easy target! Multi-layer your IT security Date: &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="144" height="135" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10795"></span></p>
<h2>Don’t be an easy target! Multi-layer your IT security</h2>
<p><b>Date: September 19, 2013 – Time: 4 p.m. BST / 5 p.m. CEST – US: 8 a.m. PDT / 11 a.m. EDT</b></p>
<p>With the growth of targeted phishing attacks, Advanced Persistent Threats and even Malware as a Service how can small and mid-sized companies keep up? With tight budgets and IT professionals stretched, to cover more with less, what level of confidence do you have in your IT security? Infiltrating a bigger company takes much more effort, but a smaller business, with vulnerable defenses can make an easier target.</p>
<p>In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet-based and cyber-attacks. The basic methodology of each threat and how to mount effective counter measures, with a multi-layered approach to security.</p>
<p><b><a href="http://bit.ly/1909iPM">Register now</a></b></p>
<h2>Securing your IT infrastructure: Managing security solutions in a complex world</h2>
<p><b>Date: September 24, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>As the types and methods of security solutions become more diverse, the challenge to manage the network security infrastructure has grown exponentially. This webcast will look at the key challenges and offer solutions to some of the most pressing issues confronting network security professionals.</p>
<p>During this webcast we will cover vulnerability assessment, threat detection and network auditing. Additionally our presenter will examine patch management, compliance, inventory assessment and effective control of BYOD (Bring Your Own Device) threats to your security and how to use these techniques to assure your data is as safe as possible.</p>
<p><b><a href="http://bit.ly/1aPtA2o">Register now</a></b></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/september-webcast-line-up-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>With Greater Storage Comes Even Greater Management Responsibility</title>
		<link>http://www.gfi.com/blog/with-greater-storage-comes-even-greater-management-responsibility/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=with-greater-storage-comes-even-greater-management-responsibility</link>
		<comments>http://www.gfi.com/blog/with-greater-storage-comes-even-greater-management-responsibility/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 16:02:42 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[archive]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Google apps]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[Smart]]></category>
		<category><![CDATA[storage]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10802</guid>
		<description><![CDATA[Today, Microsoft announced that they are doubling the storage of Exchange Online and Office 365 for their business customers by November. The storage will increase from 25GB to 50GB. WOOHOO! I hear you shout . . . but hang on &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/shutterstock_120122080.jpg"><img class="alignright  wp-image-10803" style="border: 0px solid black; margin: 10px;" alt="shutterstock_120122080" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/shutterstock_120122080-300x300.jpg" width="240" height="240" /></a>Today, Microsoft announced that they are doubling the storage of Exchange Online and Office 365 for their business customers by November. The storage will increase from 25GB to 50GB. WOOHOO! I hear you shout . . . but hang on there is more.</p>
<p>While this upgrade is surely a welcome uptick in value &#8211; as more email can be stored on the platform &#8211; let’s take a stab at understanding what the perils are in this approach for you. So effectively Microsoft is doubling the storage availability for you, while your users keep on using email more and more every day. It is just a matter of time before you hit the new ceiling as well. What will happen then?</p>
<p>As an IT or Email Administrator, you should be planning about implementing retention policies, spam filtering, cleanup operations and backup plans BEFORE you reach your hosting storage limit (be it 25GB or 50GB). If you hit the storage limit, you risk losing Emails, thus limiting your search and historic tracking ability. You are also effectively throwing away beautiful gems of business intelligence stored in Emails on your Office 365 account.</p>
<p>And these gems of information are so precious to your organization that you must do your utmost to protect them!</p>
<p>Just because your email is hosted outside your organization, the responsibility of what your users are sending to their contacts is still yours, together with all the legal liabilities that come with it. What tools does Office 365 give you to understand what is stored inside these 50GB per user of data?</p>
<p>With greater storage comes even greater management responsibility. IT and Email Administrators are the first port of call when such analysis is required by HR, company owners etc.</p>
<p>This is where tools such as MailInsights® reports within GFI MailArchiver are a perfect companion to your email system, be it on Exchange, Office 365, Google Apps or other.</p>
<p>Check it out today.</p>
<p><iframe src="//www.youtube.com/embed/aNajJHJ9x8I" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p>Not only does GFI MailArchiver provide you with a backup of your email content (for those occasions where outage in service happens), but it also empowers you to make in-depth complex searches that give you insight on how your organization’s email is being used, or misused. Powered by MailInsights, as an email administrator you will be able to answer those pesky questions related to user behavior on email including:</p>
<ul>
<li>email with inappropriate material</li>
<li>email that can lead to legal disputes</li>
<li>Email responsiveness of teams</li>
<li>Email sentiments (used to detect disgruntled users in the organizations enabling preventative actions)</li>
<li>After hours email usage</li>
<li>Job Searching</li>
<li>…and more</li>
</ul>
<p>Learn more about MailArchiver and MailInsights <a href="http://www.gfi.com/products-and-solutions/email-and-messaging-solutions/gfi-mailarchiver/Email-archiving-for-businesses">here</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/with-greater-storage-comes-even-greater-management-responsibility/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Latest News from the GFI Cloud Team</title>
		<link>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-latest-news-from-the-gfi-cloud-team</link>
		<comments>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/#comments</comments>
		<pubDate>Thu, 29 Aug 2013 14:13:53 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[asset tracking]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT Management]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10799</guid>
		<description><![CDATA[Jackie Wake, product marketing manager for GFI Cloud, shares more news of the latest version released today. Q: Tell us about the latest release of GFI Cloud? Today’s release gives new focus to Asset Tracking, a FREE service in GFI &#8230;]]></description>
				<content:encoded><![CDATA[<p><i>Jackie Wake, product marketing manager for GFI Cloud, shares more news of the latest version released today.</i></p>
<div id="attachment_10800" class="wp-caption alignright" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/jackie-wake-gfi.jpg"><img class="size-full wp-image-10800" alt="Jackie Wake, Product Marketing Manager for GFI Cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/jackie-wake-gfi.jpg" width="300" height="225" /></a><p class="wp-caption-text">Jackie Wake, Product Marketing Manager for GFI Cloud</p></div>
<h3><b>Q: Tell us about the latest release of GFI Cloud?</b></h3>
<p>Today’s release gives new focus to <b>Asset Tracking, a FREE service in GFI Cloud</b>. Where IT admins could already track an unlimited number of devices, simply and easily in the web-based console, this release looks to enhance the user experience further and make deployment even easier.</p>
<h3><b>Q: So what’s new?</b></h3>
<p>Now you can see at a glance <b>inventory information across an entire network</b>, such as operating system, processor and RAM. This means you can quickly identify underperforming PCs and computers that need to be replaced sooner than others, by filtering and sorting your network in <b>one central view</b>.</p>
<p>When the GFI Cloud agent is installed, the console now shows<b> hardware and software details in minutes</b> and new users can get <b>up to speed quickly with in-product guidance</b> on what asset tracking information is available and where it can be found.</p>
<p>Most importantly <b>Asset Tracking can be deployed, without having to trial other GFI Cloud services</b>, such as Antivirus, Monitoring or Patch Management.  At the same time, these <b>services are just one click away in </b><b>the same centralized console</b>.  So they can be quickly and easily deployed when they are needed, without having to physically re-visit any of the tracked computers.</p>
<h3><b>Q: Why do I need it?</b></h3>
<p>As an IT admin or manager, knowing what hardware and software you have is the first step to being in control of your network.  It saves time on support calls and makes life easier when you’re planning hardware refreshes and software upgrades.</p>
<p>With Asset Tracking in GFI Cloud you can see what you have at a glance, anytime from anywhere and it won’t cost you a penny… EVER!</p>
<p>The catch?  No catch, just easy to use free asset tracking forever… Simple.</p>
<h3><b>Q: Where can I check it out?</b></h3>
<p>You can get <a href="http://www.gficloud.com/land/asset-tracking-b/?adv=13558&amp;loc=54">Asset Tracking FREE today</a> and roll it out to all your devices to see for yourself how easy it is to keep track of your company’s IT asset inventory, with GFI Cloud.</p>
<p><b><i>Do you want to learn more about this product? </i></b><a href="http://www.gficloud.com/asset-tracking/?adv=13558&amp;loc=54"><b><i>Visit our website</i></b></a><b><i> to find how GFI Cloud simplifies IT management with one central view of antivirus, workstation and server monitoring, patch management and FREE asset tracking across all your servers, PCs and laptops on the move!</i></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Results Show GFI Cloud™ Can Make an IT Department More Proactive</title>
		<link>http://www.gfi.com/blog/results-show-gfi-cloud-can-make-an-it-department-more-proactive/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=results-show-gfi-cloud-can-make-an-it-department-more-proactive</link>
		<comments>http://www.gfi.com/blog/results-show-gfi-cloud-can-make-an-it-department-more-proactive/#comments</comments>
		<pubDate>Fri, 16 Aug 2013 14:49:36 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Centralized management]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT departments]]></category>
		<category><![CDATA[IT Management]]></category>
		<category><![CDATA[IT professionals]]></category>
		<category><![CDATA[Preventative IT]]></category>
		<category><![CDATA[service-based products]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10775</guid>
		<description><![CDATA[IT management has changed. Long gone are the days when a computer problem resulted in the user sitting impatiently waiting for a “techie” to attend and fix it. Remote support tools have been used to enable IT departments and support &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/gfi-cloud-survey.jpg"><img class=" wp-image-10776 alignright" style="margin: 10px; border: 0px solid black;" alt="gfi-cloud-survey" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/gfi-cloud-survey.jpg" width="154" height="230" /></a>IT management has changed. Long gone are the days when a computer problem resulted in the user sitting impatiently waiting for a “techie” to attend and fix it.</p>
<p>Remote support tools have been used to enable IT departments and support providers to take control of infrastructures from a distance, but these tools have often had shortcomings and failed to address the management of PCs and servers completely.</p>
<p>Now, however, new service-based products such as GFI Cloud take a true “ground up” view of IT management, which integrates remote support with a host of other essential IT department tasks, including managing patches, protecting machines from viruses and other threats, and monitoring the overall infrastructure.<span id="more-10775"></span></p>
<h2><b>A move towards “Preventative IT”</b></h2>
<p>Proof of just how much a system like GFI Cloud can change the working life of an IT department comes in the form of a recent case study, discussing how GFI Cloud has helped IT admin firm BVOXY adapt a far more proactive approach to computer support.</p>
<p>BVOXY’s technical director, Georgina Lloyd Parry, comments in the case study that just £208 per month for a GFI Cloud subscription can give centralized control of 80 geographically dispersed machines. This subscription covers antivirus, monitoring, and patch management as well as free asset tracking. Parry states that she has previously seen support costs of £1000 per month in engineer time running updates on a similar number of machines.</p>
<p>Obviously reducing the time IT professionals spend on routine tasks is a key benefit, but the implementation of GFI Cloud has also helped with a more profound move towards what Parry refers to as “preventative IT.” GFI Cloud’s central dashboard view provides her with an early warning of problems, helping her move away from reactive fire-fighting and frees up her time to spend on higher-level concerns, particularly “enabling” the business with the technology it needs to grow and succeed.</p>
<h2><b>Centralized management</b></h2>
<p>GFI Cloud is an effective way to make things easier for the IT team, according to a recent internal <a href="http://www.gfi.com/blog/the-gfi-cloud-survey-an-insight-into-modern-it-management/">GFI survey</a>: 61% specifically highlighted that centralized management was easier post-implementation.</p>
<p>Effective centralized management really comes into its own “out of hours” when a product like GFI Cloud can deal with routine tasks like deploying patches to applications and running virus scans – all those tasks that used to result in IT workers having to work during evenings and weekends.</p>
<p>Parry agrees, saying: “With GFI Cloud I achieve 10 times more work.” She particularly complements GFI Cloud’s fast agent installation and unnoticeable impact on system performance. She also praises the system’s email notifications, which alert her to urgent problems whilst minimizing disturbances because not all issues need her immediate attention.</p>
<p>As the case study states, “IT should be a partner in the business”. Proactive IT professionals should already know this, and know that a product that facilitates it can be worth its weight in gold.</p>
<p><i><a href="http://www.gficloud.com/testimonials/?adv=13558&amp;loc=48">Visit our website</a> to read the full case study or start a </i><a href="http://www.gficloud.com/land/gfi-cloud-unified/?adv=13558&amp;loc=48"><i>free 30-day trial</i></a><i> and find out how GFI Cloud could simplify your IT management.</i></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/results-show-gfi-cloud-can-make-an-it-department-more-proactive/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 21:24:17 by W3 Total Cache --