Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Top 3 Patch Management Do’s and Don’ts

Top 3 Patch Management Do’s and Don’ts

on March 28, 2011

A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …

Read the Full Story
4
4 Reasons for Implementing Patch Management Software

4 Reasons for Implementing Patch Management Software

on March 21, 2011

Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …

Read the Full Story
4
How Events Monitoring can Prevent IT Disasters (Part 3)

How Events Monitoring can Prevent IT Disasters (Part 3)

on March 14, 2011

In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …

Read the Full Story
2
How Events Monitoring can Prevent IT Disasters (Part 2)

How Events Monitoring can Prevent IT Disasters (Part 2)

on March 8, 2011

In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …

Read the Full Story
3
How Events Monitoring can Prevent IT Disasters (Part 1)

How Events Monitoring can Prevent IT Disasters (Part 1)

on March 4, 2011

An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …

Read the Full Story
3
Can Companies Defend Against Targeted Attacks? (Part 2)

Can Companies Defend Against Targeted Attacks? (Part 2)

on March 1, 2011

In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary – why were they apparently so easy to …

Read the Full Story
2
Can Companies Defend Against Targeted Attacks? (Part 1)

Can Companies Defend Against Targeted Attacks? (Part 1)

on February 24, 2011

The story with all the interesting details about how security company HBGary was hacked earlier this month, published by Ars Technica last week, has made quite some noise with people concerned about IT security. It is a perfect – by …

Read the Full Story
4
A Quick Look at On-Premise E-mail Archiving

A Quick Look at On-Premise E-mail Archiving

on February 23, 2011

In a previous post, I discussed the concept of e-mail archiving in the cloud and ran through some pros and cons of hosting your e-mail archive off-site. Today we’ll take a quick look at on-premise e-mail archiving. Having an on-premise …

Read the Full Story
4
5 Threats to Watch out for when Using a Public Machine

5 Threats to Watch out for when Using a Public Machine

on February 21, 2011

Recently I wrote an article highlighting steps to take if you provide public computer access to your customers to ensure their security. The news then broke out that hardware key loggers were found at public libraries in Manchester. Public libraries …

Read the Full Story
5
Top Most Vulnerable Applications and Operating Systems in 2010

Top Most Vulnerable Applications and Operating Systems in 2010

on February 17, 2011

Analyzing the data on 2010 from National Vulnerability Database reveals some interesting statistics.

Read the Full Story
14