Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Top 10 Security Precautions when using Social Networking Sites

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

Read the Full Story
13
How to secure your network the old fashioned way

How to secure your network the old fashioned way

on June 18, 2010

Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …

Read the Full Story
5
Beware of World Cup scams, malware and other online threats

Beware of World Cup scams, malware and other online threats

on June 14, 2010

The 2010 World Cup is finally under way and millions of football fans around the world will be tuning in over the next three weeks to watch their favourite national team compete in one of the world’s most popular sporting …

Read the Full Story
1
How to dispose of confidential data

How to dispose of confidential data

Administrators know the importance of keeping confidential data confidential but sometimes a small lapse can turn the enforcer into the perpetrator. Hardware gets old and needs to be replaced as does faulty hardware; however, what happens to the old stuff? …

Read the Full Story
6
Secrets to installing a safe server

Secrets to installing a safe server

on June 11, 2010

Installing a server is something a lot of people undertake today. Whether you’re a student, administrator or IT professional, it is very likely that one day or another you’ll need to install a server which will be exposed to the …

Read the Full Story
0
Event Monitoring – An Overview (Part 2 of 2)

Event Monitoring – An Overview (Part 2 of 2)

on June 2, 2010

In the previous blog post we looked at the importance of event logs and all the useful information that event logs provide us with. How does one access these logs? Windows Events As stated previously on the windows platform the …

Read the Full Story
0
Event Monitoring – An Overview (Part 1 of 2)

Event Monitoring – An Overview (Part 1 of 2)

Since the dawn of the computer age, computing has been all about the interaction between man and the machine. In the beginning communication with a machine was very limited relying on complex mechanisms such as the punch card but as …

Read the Full Story
0
Cloud computing – Security Implications: Compliance

Cloud computing – Security Implications: Compliance

on June 1, 2010

In the previous articles on cloud computing we considered the security implications in choosing a provider as well as what needs to be done to have security in the cloud. Next we will discuss what cloud computing means to our …

Read the Full Story
6
Cloud computing – Security Implications: The Client Perspective

Cloud computing – Security Implications: The Client Perspective

on May 24, 2010

In the previous article on cloud computing we considered what to look for and what questions to ask security wise when looking for a cloud service provider. In this article we’ll look at what steps we can take to ensure …

Read the Full Story
2
Cloud computing – Security Implications: The Service Provider

Cloud computing – Security Implications: The Service Provider

on May 21, 2010

One does not need a crystal ball to deduce that cloud computing will be the next big thing and because of this there needs to be some re-thinking of a company’s security strategy in order to safeguard the company data. …

Read the Full Story
2