Category Archives: SMB Zone
Intelligent people do dumb things
It’s official. Intelligent people do dumb things. Earlier this month, an internet fraudster – who had cashed in nearly half a million pounds – was put behind bars for two years for his part in a gang running various web-based …
How hard is it to get robbed?
There are a number of software products that can help you protect your network from both internal and external attacks. Protecting the network with these tools is, relatively speaking, the easy part. The hard part is to design security policies …
When security threats are closer to home – literally
I had an interesting discussion with a couple of colleagues on the value of consumer security research to the business community. They argued that a business is not really interested in what home users do and, moreover, the security risks …
Trade Secrets and Intellectual Property
There are different objectives behind malware and hacking attacks, and one of the primary reasons is obviously financial gain. The methods malicious hackers use to achieve financial gain have over time changed and evolved. In the past, this activity centered …
Why do you need effective web content filtering?
In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This …
The Insidious Insider Threat!
In security we often preach that insider threats are generally the worst. When the attacker is one of your own the challenge to keep your systems safe becomes a lot harder. This is because you effectively tell your staff what …
4 Reasons to monitor Internet usage within your organization
If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take …
What are Teenagers Really Doing Online?
A scientific study of home Internet use by parents and their teenage children to better understand how they behave online, has been released by GFI. Designed and implemented by a noted polling expert, the nationally-representative 2011 Parent-Teen Internet Safety Report identifies …
What next for TMG users?
In its latest “Magic Quadrant for Secure Web Gateway Report”, Gartner has reported that Microsoft had advised that it will no longer be shipping TMG – but only “sustaining” it for the time being until its declared end-of-life. Deb Shinder …
It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?
I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our …










