Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Cloud computing – Security Implications: The Client Perspective

Cloud computing – Security Implications: The Client Perspective

on May 24, 2010

In the previous article on cloud computing we considered what to look for and what questions to ask security wise when looking for a cloud service provider. In this article we’ll look at what steps we can take to ensure …

Read the Full Story
2
Cloud computing – Security Implications: The Service Provider

Cloud computing – Security Implications: The Service Provider

on May 21, 2010

One does not need a crystal ball to deduce that cloud computing will be the next big thing and because of this there needs to be some re-thinking of a company’s security strategy in order to safeguard the company data. …

Read the Full Story
2
Securing your environment from the threats you actually paid for

Securing your environment from the threats you actually paid for

on May 11, 2010

Every business IT infrastructure requires tools. Obviously no one company develops every tool it needs in-house and at one time or another every company will end up buying software. Sometimes we take the software we buy for granted and this …

Read the Full Story
2
The Importance of an Effective ITIL Change Management Process

The Importance of an Effective ITIL Change Management Process

on May 10, 2010

Technology and the IT infrastructure are constantly changing and advancing. This means that at some point a company will need to go through a change management process to keep up to date with the latest technologies.

Read the Full Story
3
Who’s watching the watchers?

Who’s watching the watchers?

on May 6, 2010

Security has a bit of a dark side. When people are given power over other people there often seems to be the urge to abuse that power.  We have previously covered the scandal in which a school used webcams on …

Read the Full Story
2
Protecting your employees from themselves

Protecting your employees from themselves

on May 5, 2010

Scams are getting bolder and more intelligent all the time. Recent the BBC broke a story about a new scareware malware which exploits people looking for pornography. The malware which masquerades as a pornographic game once downloaded and run takes …

Read the Full Story
2
Secure SHell (SSH): making life easier

Secure SHell (SSH): making life easier

on May 4, 2010

SSH is a very useful tool for anyone using Linux Environments. It’s a secure way to log into a machine remotely but can also do a lot more. With SSH one can create tunnels –  that is have the local …

Read the Full Story
0
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 3)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 3)

on April 6, 2010

This is the final segment in this three-part series where we have looked at the importance of security within an organization; the different types of attacks that could occur and the motivation behind these attacks. What should one do? This …

Read the Full Story
2
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 2)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 2)

In the first part of this series we discussed the different security attacks that a business needs to protect against. What about motivation? Why would anyone attack my business? Financial motivation is the most obvious reason. The attacker simply wants …

Read the Full Story
0
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 1)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 1)

Security is a tricky subject; you get people who push for security and other who claim that it is all a waste of money. What is the truth? Is security really worth the investment? Will organizations get something in return …

Read the Full Story
1