Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Email archiving as an alternative to PST backup

Email archiving as an alternative to PST backup

on April 26, 2011

Microsoft does not want you to backup PST files Email is the internet’s original killer app and if your work depends on email then you are most likely using Microsoft Outlook as your email client. Your emails, tasks, calendar items …

Read the Full Story
4
How to Detect Network Intruders (Part 2)

How to Detect Network Intruders (Part 2)

on April 21, 2011

In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client …

Read the Full Story
4
How to Detect Network Intruders (Part 1)

How to Detect Network Intruders (Part 1)

on April 18, 2011

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …

Read the Full Story
6
How to repair PST files

How to repair PST files

on April 13, 2011

One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …

Read the Full Story
2
Why the Need for Internet Monitoring?

Why the Need for Internet Monitoring?

on April 11, 2011

There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for …

Read the Full Story
4
How End Point Security Software Can Prevent Data Theft

How End Point Security Software Can Prevent Data Theft

on April 4, 2011

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …

Read the Full Story
3
The Importance of Using Multiple Passwords

The Importance of Using Multiple Passwords

on March 31, 2011

One of the most hated security policies is that of asking users to have different passwords for each different service they make use of. Many see this as unnecessary because they reason that if their chosen password is strong enough …

Read the Full Story
3
Top 3 Patch Management Do’s and Don’ts

Top 3 Patch Management Do’s and Don’ts

on March 28, 2011

A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …

Read the Full Story
4
4 Reasons for Implementing Patch Management Software

4 Reasons for Implementing Patch Management Software

on March 21, 2011

Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …

Read the Full Story
4
How Events Monitoring can Prevent IT Disasters (Part 3)

How Events Monitoring can Prevent IT Disasters (Part 3)

on March 14, 2011

In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …

Read the Full Story
2