Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: SMB Zone

Current tech issues, research and articles, tailor-made for the SME!

Intelligent people do dumb things

Intelligent people do dumb things

on July 15, 2011

It’s official. Intelligent people do dumb things. Earlier this month, an internet fraudster – who had cashed in nearly half a million pounds – was put behind bars for two years for his part in a gang running various web-based …

Read the Full Story
4
How hard is it to get robbed?

How hard is it to get robbed?

on July 11, 2011

There are a number of software products that can help you protect your network from both internal and external attacks. Protecting the network with these tools is, relatively speaking, the easy part. The hard part is to design security policies …

Read the Full Story
5
When security threats are closer to home – literally

When security threats are closer to home – literally

on July 7, 2011

I had an interesting discussion with a couple of colleagues on the value of consumer security research to the business community. They argued that a business is not really interested in what home users do and, moreover, the security risks …

Read the Full Story
4
Trade Secrets and Intellectual Property

Trade Secrets and Intellectual Property

on July 5, 2011

There are different objectives behind malware and hacking attacks, and one of the primary reasons is obviously financial gain. The methods malicious hackers use to achieve financial gain have over time changed and evolved. In the past, this activity centered …

Read the Full Story
6
Why do you need effective web content filtering?

Why do you need effective web content filtering?

on July 4, 2011

In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This …

Read the Full Story
4
The Insidious Insider Threat!

The Insidious Insider Threat!

on June 30, 2011

In security we often preach that insider threats are generally the worst. When the attacker is one of your own the challenge to keep your systems safe becomes a lot harder. This is because you effectively tell your staff what …

Read the Full Story
6
4 Reasons to monitor Internet usage within your organization

4 Reasons to monitor Internet usage within your organization

on June 23, 2011

If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take …

Read the Full Story
5
What are Teenagers Really Doing Online?

What are Teenagers Really Doing Online?

on June 16, 2011

A scientific study of home Internet use by parents and their teenage children to better understand how they behave online, has been released by GFI. Designed and implemented by a noted polling expert, the nationally-representative 2011 Parent-Teen Internet Safety Report identifies …

Read the Full Story
5
What next for TMG users?

What next for TMG users?

on June 10, 2011

In its latest “Magic Quadrant for Secure Web Gateway Report”, Gartner has reported that Microsoft had advised that it will no longer be shipping TMG – but only “sustaining” it for the time being until its declared end-of-life. Deb Shinder …

Read the Full Story
2
It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?

It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?

on June 7, 2011

I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our …

Read the Full Story
4