Category Archives: SMB Zone
Don’t Get Stuck in the Technology Trap! [Webcast]
Kicking off a new series of business webcasts on IT management, expert presenter, Barclay Rae, takes a closer look at how small and mid-sized companies can keep costs down and IT running efficiently, while ensuring they focus on core business …
When “Small” is “Big” – Small Thumb Drives Continue to Be a Big Security Threat
The leakage of ‘top secret’ information from the National Security Agency (NSA) by former contractor Edward Snowden, has sent shockwaves throughout US security institutions. Not only have the documents alleged ‘snooping by the US authorities’ but the theft of data …
Take Control from the Cloud
Way back in 2007, Microsoft invited me, along with several other writers from the IT community, to attend an “IT pro townhall meeting” in Redmond. I remember sitting in a room on campus, listening to Mark Minasi and George Ou …
Survey: 32% of IT Admins Do Not Test Backup Solutions for Effectiveness
We have conducted a new survey that reveals how small to medium-sized businesses are losing critical business information as a result of failed backups, and have suffered significant impacts as a result. Many IT admins surveyed revealed that a failed …
Email Archiving Doesn’t Have to be a DIY Project
The “do it yourself” craze is big, and there’s a good reason for that. You can learn a lot, save money, and ensure that things get done your way. But there’s a down side, as well. The success (or not) …
What’s New in GFI WebMonitor®
David Attard, Product Manager for GFI WebMonitor, talks about what’s new in GFI WebMonitor 2013.
Why Cloud-based IT Management Is “It” for IT
The big trend in IT from the do-it-yourself business owner to the enterprise is cloud-based IT management. It’s not just because “the cloud” is the big buzzword and no one wants to be left behind. It’s because cloud-based IT management …
Networks without Borders: The New Security Paradigm
In ancient times, cities were often walled fortresses, with heavily guarded perimeters, and strangers were closely scrutinized before being allowed to pass through the gates. Likewise, in the “old days” of computer networking, there were strict lines of demarcation between …
June Webcast Line-Up
Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!
How to Protect Your Twitter Account from Targeted Phishing Attacks
The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, …










