Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

10 Tips to Avoid Spam

10 Tips to Avoid Spam

on July 7, 2010

Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …

Read the Full Story
9
Wild Wild West (WWW)

Wild Wild West (WWW)

on July 5, 2010

In the past decade the internet has surpassed all expectations and changed the lives of us all. The World Wide Web holds little or no safety for the end user. Very much like the Wild West in the 1800s, the …

Read the Full Story
3
How to create a complex and secure backup strategy

How to create a complex and secure backup strategy

on July 1, 2010

Nobody likes to backup, but the reality is that hard drive failure or other types of disaster (natural or not) is something that we need to be prepared for at any time. What better way of being prepared for disaster …

Read the Full Story
3
Is Privacy Dead?

Is Privacy Dead?

on June 28, 2010

With the advent of the internet many people seem to forget about privacy and its importance.  Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …

Read the Full Story
12
Do you know the dangers of wireless networks?

Do you know the dangers of wireless networks?

on June 24, 2010

I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …

Read the Full Story
7
Top 10 Security Precautions when using Social Networking Sites

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

Read the Full Story
13
How to secure your network the old fashioned way

How to secure your network the old fashioned way

on June 18, 2010

Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …

Read the Full Story
5
Beware of World Cup scams, malware and other online threats

Beware of World Cup scams, malware and other online threats

on June 14, 2010

The 2010 World Cup is finally under way and millions of football fans around the world will be tuning in over the next three weeks to watch their favourite national team compete in one of the world’s most popular sporting …

Read the Full Story
1
How to dispose of confidential data

How to dispose of confidential data

Administrators know the importance of keeping confidential data confidential but sometimes a small lapse can turn the enforcer into the perpetrator. Hardware gets old and needs to be replaced as does faulty hardware; however, what happens to the old stuff? …

Read the Full Story
6
Secrets to installing a safe server

Secrets to installing a safe server

on June 11, 2010

Installing a server is something a lot of people undertake today. Whether you’re a student, administrator or IT professional, it is very likely that one day or another you’ll need to install a server which will be exposed to the …

Read the Full Story
0