Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Education is Your Only Defence against Shoulder Surfing

Education is Your Only Defence against Shoulder Surfing

on July 4, 2013

All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most …

Read the Full Story
0
Top 20 Free Disk Tools for SysAdmins

Top 20 Free Disk Tools for SysAdmins

on June 12, 2013

Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some …

Read the Full Story
2
The Hidden Security Threat

The Hidden Security Threat

on May 29, 2013

Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my …

Read the Full Story
0
Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?

Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?

on May 13, 2013

It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. …

Read the Full Story
0
How to Avoid Becoming the Villain

How to Avoid Becoming the Villain

on April 19, 2013

Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …

Read the Full Story
0
Hear! Hear! Tips from THE IT Security Experts

Hear! Hear! Tips from THE IT Security Experts

on March 22, 2013

We all have our take on IT security, and if you’re reading this post it means you want to hear more. So do we, that’s why we have reached out to some well-known IT experts in the security blogosphere and …

Read the Full Story
1
Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

on February 27, 2013

As I was flying home from a customer engagement, I looked down from the window of the airplane to see all the clouds floating lazily below me. It was not a completely overcast day, so I could easily see the …

Read the Full Story
0
13 for ’13 Jumpstart: Upgrades

13 for ’13 Jumpstart: Upgrades

on February 11, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013 in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help …

Read the Full Story
0
Report: The Most Vulnerable Operating Systems and Applications in 2012

Report: The Most Vulnerable Operating Systems and Applications in 2012

on February 5, 2013

Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s …

Read the Full Story
3
13 for ’13 Jumpstart: Multifactor Authentication

13 for ’13 Jumpstart: Multifactor Authentication

on January 24, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested 13 great IT projects for you to consider. We decided to publish some follow-up articles to …

Read the Full Story
0