Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?

Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?

on May 13, 2013

It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. …

Read the Full Story
0
How to Avoid Becoming the Villain

How to Avoid Becoming the Villain

on April 19, 2013

Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …

Read the Full Story
0
Hear! Hear! Tips from THE IT Security Experts

Hear! Hear! Tips from THE IT Security Experts

on March 22, 2013

We all have our take on IT security, and if you’re reading this post it means you want to hear more. So do we, that’s why we have reached out to some well-known IT experts in the security blogosphere and …

Read the Full Story
1
Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

on February 27, 2013

As I was flying home from a customer engagement, I looked down from the window of the airplane to see all the clouds floating lazily below me. It was not a completely overcast day, so I could easily see the …

Read the Full Story
0
13 for ’13 Jumpstart: Upgrades

13 for ’13 Jumpstart: Upgrades

on February 11, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013 in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help …

Read the Full Story
0
Report: The Most Vulnerable Operating Systems and Applications in 2012

Report: The Most Vulnerable Operating Systems and Applications in 2012

on February 5, 2013

Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s …

Read the Full Story
3
13 for ’13 Jumpstart: Multifactor Authentication

13 for ’13 Jumpstart: Multifactor Authentication

on January 24, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested 13 great IT projects for you to consider. We decided to publish some follow-up articles to …

Read the Full Story
0
13 for ’13 Jumpstart: User Provisioning

13 for ’13 Jumpstart: User Provisioning

on January 11, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we recommended 13 great IT projects for you to consider, since many IT departments start lining up their …

Read the Full Story
1
13 for ’13 Jumpstart: BYOD and MDM

13 for ’13 Jumpstart: BYOD and MDM

on January 2, 2013

A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested thirteen great IT projects for you to consider, since as the New Year approaches, many IT …

Read the Full Story
0
Windows PowerShell: Essential Admin Scripts (Part 2)

Windows PowerShell: Essential Admin Scripts (Part 2)

on December 26, 2012

In Part 1 of this two-part series, I covered the ‘Microsoft Troubleshooting Packs’ and ACL permission checks using PowerShell scripting. This article will focus on two more scripts, one to check if a host is alive and, if it is …

Read the Full Story
0