Category Archives: SMB Zone
Twitter in the workplace: to take action or not to take action?
Twitter has, like similar social networking sites, raised many security questions – especially when it comes to whether businesses should allow employees access in the workplace. While many businesses have adopted Twitter as part of their marketing arsenal, they would …
Top 5 Risks caused by employees’ actions
Employees generally do not mean to harm the organization for which they work; however, sometimes due to a lack of due diligence or even lack of education on security employees might pose a grave security risk to an organization. Below …
8 Handy Backup Tips for SMBs
A computer crash is eventually going to happen to anyone. Therefore you should be well prepared for such an incident. Each backup strategy has its own particularities and depends a lot on the specifics of your business; however, all backup …
Review Round-up
What better way to understand whether a specific product is right for you than to read a detailed review from someone who has already used it? We’ve gathered the latest reviews of GFI WebMonitor, GFI MAX RemoteManagement, GFI MAX MailProtection …
Backup is dead. Long live backup!
The editor of Storage Newsletter created a few waves earlier this month when he wrote an opinion piece entitled ‘Backup is dead’. He made the point that backup today has no more interest and organizations only need replication. I won’t …
I spy with my little eye…
I came across a very interesting post by Peter Cochrane that should send shivers down the spine of anybody reading it. And if you are a security professional, I’d recommend grabbing the chair closest to you. It reads like the …
You just lost yourselves £500,000 for being reckless
The Information Commissioner’s Office in the UK, thanks to new powers that came into force last week, can now impose a fine of up to £500,000 on organizations that recklessly lose data. The three words, ‘of up to’ are significant …
The tale of Gray Powell and the lost iPhone 4.0
Malware creators love a juicy news story Malware creators just love a news story that has the perfect ingredients: a leading brand name, a prototype phone and a thriving IT community just dying to hear what the latest gadget is …
Twitter in the workplace – the threats
Twitter was named ‘word’ of the year in 2009 confirming the growth of a social networking and media site that is used by over 350 million people worldwide. However, Twitter is also gaining a reputation as a security risk for …
The Hybrid Approach – giving SMBs the ‘best of both worlds’
Small and medium-size businesses (SMBs) can benefit a great deal from Cloud-based services but this does not mean they have to do away with their existing infrastructure. On the contrary, careful planning, a thorough understanding of what the business and …










