Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

How Events Monitoring can Prevent IT Disasters (Part 2)

How Events Monitoring can Prevent IT Disasters (Part 2)

on March 8, 2011

In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …

Read the Full Story
3
How Events Monitoring can Prevent IT Disasters (Part 1)

How Events Monitoring can Prevent IT Disasters (Part 1)

on March 4, 2011

An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …

Read the Full Story
3
Can Companies Defend Against Targeted Attacks? (Part 2)

Can Companies Defend Against Targeted Attacks? (Part 2)

on March 1, 2011

In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary – why were they apparently so easy to …

Read the Full Story
2
Can Companies Defend Against Targeted Attacks? (Part 1)

Can Companies Defend Against Targeted Attacks? (Part 1)

on February 24, 2011

The story with all the interesting details about how security company HBGary was hacked earlier this month, published by Ars Technica last week, has made quite some noise with people concerned about IT security. It is a perfect – by …

Read the Full Story
4
A Quick Look at On-Premise E-mail Archiving

A Quick Look at On-Premise E-mail Archiving

on February 23, 2011

In a previous post, I discussed the concept of e-mail archiving in the cloud and ran through some pros and cons of hosting your e-mail archive off-site. Today we’ll take a quick look at on-premise e-mail archiving. Having an on-premise …

Read the Full Story
4
5 Threats to Watch out for when Using a Public Machine

5 Threats to Watch out for when Using a Public Machine

on February 21, 2011

Recently I wrote an article highlighting steps to take if you provide public computer access to your customers to ensure their security. The news then broke out that hardware key loggers were found at public libraries in Manchester. Public libraries …

Read the Full Story
5
Top Most Vulnerable Applications and Operating Systems in 2010

Top Most Vulnerable Applications and Operating Systems in 2010

on February 17, 2011

Analyzing the data on 2010 from National Vulnerability Database reveals some interesting statistics.

Read the Full Story
14
The Ins and Outs of Vulnerability Scanning

The Ins and Outs of Vulnerability Scanning

on February 4, 2011

What are Vulnerability Scanners? Vulnerability scanners check your network against a database of known vulnerabilities; such a database is usually compiled from respectable resources such as CVE (http://cve.mitre.org) or OVAL (http://oval.mitre.org). They can also check for administrative oversights such as …

Read the Full Story
2
6 Tips for a Successful Patching Process

6 Tips for a Successful Patching Process

on January 27, 2011

Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With …

Read the Full Story
3
10 Easy Steps to set up your first Virtual Machine with Hyper-V

10 Easy Steps to set up your first Virtual Machine with Hyper-V

on January 17, 2011

Open up Server Manager and click on ‘Add Roles’. At the ‘Before You Begin’ page, click Next. Select ‘Hyper-V’ from the list of Roles in the ‘Select Server Roles’ page and click Next through the wizard until you get the …

Read the Full Story
0