Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Is Privacy Dead?

Is Privacy Dead?

on June 28, 2010

With the advent of the internet many people seem to forget about privacy and its importance.  Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …

Read the Full Story
12
Do you know the dangers of wireless networks?

Do you know the dangers of wireless networks?

on June 24, 2010

I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …

Read the Full Story
7
Top 10 Security Precautions when using Social Networking Sites

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

Read the Full Story
13
How to secure your network the old fashioned way

How to secure your network the old fashioned way

on June 18, 2010

Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …

Read the Full Story
5
Beware of World Cup scams, malware and other online threats

Beware of World Cup scams, malware and other online threats

on June 14, 2010

The 2010 World Cup is finally under way and millions of football fans around the world will be tuning in over the next three weeks to watch their favourite national team compete in one of the world’s most popular sporting …

Read the Full Story
1
How to dispose of confidential data

How to dispose of confidential data

Administrators know the importance of keeping confidential data confidential but sometimes a small lapse can turn the enforcer into the perpetrator. Hardware gets old and needs to be replaced as does faulty hardware; however, what happens to the old stuff? …

Read the Full Story
6
Secrets to installing a safe server

Secrets to installing a safe server

on June 11, 2010

Installing a server is something a lot of people undertake today. Whether you’re a student, administrator or IT professional, it is very likely that one day or another you’ll need to install a server which will be exposed to the …

Read the Full Story
0
Event Monitoring – An Overview (Part 2 of 2)

Event Monitoring – An Overview (Part 2 of 2)

on June 2, 2010

In the previous blog post we looked at the importance of event logs and all the useful information that event logs provide us with. How does one access these logs? Windows Events As stated previously on the windows platform the …

Read the Full Story
0
Event Monitoring – An Overview (Part 1 of 2)

Event Monitoring – An Overview (Part 1 of 2)

Since the dawn of the computer age, computing has been all about the interaction between man and the machine. In the beginning communication with a machine was very limited relying on complex mechanisms such as the punch card but as …

Read the Full Story
0
Cloud computing – Security Implications: Compliance

Cloud computing – Security Implications: Compliance

on June 1, 2010

In the previous articles on cloud computing we considered the security implications in choosing a provider as well as what needs to be done to have security in the cloud. Next we will discuss what cloud computing means to our …

Read the Full Story
6