<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Videos</title>
	<atom:link href="http://www.gfi.com/blog/category/videos/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Faxing In The Healthcare Industry &#8211; HIPAA Compliance</title>
		<link>http://www.gfi.com/blog/faxing-in-the-healthcare-industry-hipaa-compliance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=faxing-in-the-healthcare-industry-hipaa-compliance</link>
		<comments>http://www.gfi.com/blog/faxing-in-the-healthcare-industry-hipaa-compliance/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 09:24:51 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Messaging]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[hipaa compliance]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10639</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=CwThd-_vWvA The security provision of HIPAA demands that healthcare providers take reasonable care to protect the confidentiality of protected healthcare information (also known as PHI). Traditional fax machines don&#8217;t qualify, making network fax servers the only way to safely and &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=CwThd-_vWvA">http://www.youtube.com/watch?v=CwThd-_vWvA</a></p>
<p>The security provision of HIPAA demands that healthcare providers take reasonable care to protect the confidentiality of protected healthcare information (also known as PHI).</p>
<p>Traditional fax machines don&#8217;t qualify, making network fax servers the only way to safely and securely transmit confidential patient data.</p>
<p>And that isn&#8217;t the only advantage of using a fax server in your healthcare business! Watch our quick video to find out more about faxing in the healthcare industry.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/faxing-in-the-healthcare-industry-hipaa-compliance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Choosing the right patch management software</title>
		<link>http://www.gfi.com/blog/choosing-the-right-patch-management-software/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=choosing-the-right-patch-management-software</link>
		<comments>http://www.gfi.com/blog/choosing-the-right-patch-management-software/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 15:23:13 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10558</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=QeDUdg9fWUw A recent Ponemon Institute study estimates it costs businesses $214 per single, compromised record &#8212; so just imagine what it would cost if thousands of records on your system were compromised. Add to that the impact on reputation, lost &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=QeDUdg9fWUw">http://www.youtube.com/watch?v=QeDUdg9fWUw</a></p>
<p>A recent Ponemon Institute study estimates it costs businesses $214 per single, compromised record &#8212; so just imagine what it would cost if thousands of records on your system were compromised.</p>
<p>Add to that the impact on reputation, lost business and potential legal ramifications and it is easy to see the additional value provided by automatic vulnerability scanning.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/choosing-the-right-patch-management-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Maintaining web security in a connected world</title>
		<link>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=maintaining-web-security-in-a-connected-world</link>
		<comments>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/#comments</comments>
		<pubDate>Thu, 06 Jun 2013 10:11:06 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[business internet]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[internet use in business]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10555</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=_qMdcLu947Q As a manager or business owner, you&#8217;re probably more aware than most of the risks posed by the Internet. But there is no reason to be afraid of it or avoid it altogether. You just need a little help. A &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=_qMdcLu947Q">http://www.youtube.com/watch?v=_qMdcLu947Q</a></p>
<p>As a manager or business owner, you&#8217;re probably more aware than most of the risks posed by the Internet. But there is no reason to be afraid of it or avoid it altogether. You just need a little help.</p>
<p>A solution to monitor Internet use, block infected websites, recognize malicious programs and protect you from the worst. By implementing a solid monitoring solution and educating your employees about the dangers that lurk online, your business will benefit from much safer, more effective Internet use.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Faxing Efficiency Through Automation</title>
		<link>http://www.gfi.com/blog/faxing-efficiency-through-automation-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=faxing-efficiency-through-automation-2</link>
		<comments>http://www.gfi.com/blog/faxing-efficiency-through-automation-2/#comments</comments>
		<pubDate>Thu, 09 May 2013 15:20:02 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Messaging]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[efficient fax]]></category>
		<category><![CDATA[email faxing]]></category>
		<category><![CDATA[fax to email]]></category>
		<category><![CDATA[faxing]]></category>
		<category><![CDATA[FOIP]]></category>
		<category><![CDATA[Online faxing]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10514</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=Msk7ObS7GiI While faxing may be viewed as legacy technology, it&#8217;s far from that. Faxing has moved on along with the rest of the world to become a fast, efficient method of communication. In many countries, it is still the only &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=Msk7ObS7GiI" target="_blank">http://www.youtube.com/watch?v=Msk7ObS7GiI</a></p>
<p>While faxing may be viewed as legacy technology, it&#8217;s far from that. Faxing has moved on along with the rest of the world to become a fast, efficient method of communication.</p>
<p>In many countries, it is still the only method of electronic communication that is legally binding and it is the only way of sending compliant documents electronically. Those reasons alone make it a very valid technology.</p>
<p>Thanks to network faxing, it has never been easier or more straightforward to use fax in the day-to-day running of your business.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/faxing-efficiency-through-automation-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Faxing Efficiency Through Automation</title>
		<link>http://www.gfi.com/blog/faxing-efficiency-through-automation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=faxing-efficiency-through-automation</link>
		<comments>http://www.gfi.com/blog/faxing-efficiency-through-automation/#comments</comments>
		<pubDate>Mon, 22 Apr 2013 08:15:08 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Messaging]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[cloud fax]]></category>
		<category><![CDATA[cloud-based fax service providers]]></category>
		<category><![CDATA[eFax]]></category>
		<category><![CDATA[efax corporate]]></category>
		<category><![CDATA[Fax over IP]]></category>
		<category><![CDATA[faxing]]></category>
		<category><![CDATA[FOIP]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10455</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=Msk7ObS7GiI While faxing may be viewed as legacy technology, it&#8217;s far from that. Faxing has moved on along with the rest of the world to become a fast, efficient method of communication. In many countries, it is still the only &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=Msk7ObS7GiI">http://www.youtube.com/watch?v=Msk7ObS7GiI</a></p>
<p>While faxing may be viewed as legacy technology, it&#8217;s far from that. Faxing has moved on along with the rest of the world to become a fast, efficient method of communication.</p>
<p>In many countries, it is still the only method of electronic communication that is legally binding and it is the only way of sending compliant documents electronically. Those reasons alone make it a very valid technology.</p>
<p>Thanks to network faxing, it has never been easier or more straightforward to use fax in the day-to-day running of your business.</p>
<p>Watch our short video to learn more and visit <a href="http://www.gfi.com/fax-server-software/?adv=28889&amp;loc=1" target="_blank">http://www.gfi.com/fax-server-software/</a> for more information on GFI FaxMaker.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/faxing-efficiency-through-automation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Plugging the Bandwidth Drain</title>
		<link>http://www.gfi.com/blog/plugging-the-bandwidth-drain/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=plugging-the-bandwidth-drain</link>
		<comments>http://www.gfi.com/blog/plugging-the-bandwidth-drain/#comments</comments>
		<pubDate>Thu, 28 Mar 2013 14:56:40 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[bandwidth consumption]]></category>
		<category><![CDATA[Bandwidth Hogging]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10413</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=JZ7jbBFsiCY Managing your resources as effectively as possible is the key to profitability. Network bandwidth is one such resource and yet it is often squandered while employees are wasting time on the network. There are many ways to use up &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=JZ7jbBFsiCY">http://www.youtube.com/watch?v=JZ7jbBFsiCY</a></p>
<p>Managing your resources as effectively as possible is the key to profitability. Network bandwidth is one such resource and yet it is often squandered while employees are wasting time on the network. There are many ways to use up your bandwidth &#8212; watch our quick vid to find out more and to discover how you can manage your bandwidth with minimal effort!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/plugging-the-bandwidth-drain/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mac Malware</title>
		<link>http://www.gfi.com/blog/mac-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mac-malware</link>
		<comments>http://www.gfi.com/blog/mac-malware/#comments</comments>
		<pubDate>Wed, 27 Jun 2012 14:27:16 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[mac antivirus]]></category>
		<category><![CDATA[mac malware]]></category>
		<category><![CDATA[mac virus]]></category>
		<category><![CDATA[mac viruses]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8880</guid>
		<description><![CDATA[In the past, few viruses have targeted Apple operating systems &#8212; but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users &#8230;]]></description>
				<content:encoded><![CDATA[<p>In the past, few viruses have targeted Apple operating systems &#8212; but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users about this growing threat and implement a business antivirus solution for Macs as they do for PCs.</p>
<p><a href="http://www.youtube.com/watch?v=MOflZBB4qGc" target="_blank">http://www.youtube.com/watch?v=MOflZBB4qGc</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/mac-malware/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How event monitoring can prevent IT disasters</title>
		<link>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-event-monitoring-can-prevent-it-disasters</link>
		<comments>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/#comments</comments>
		<pubDate>Mon, 25 Jun 2012 09:03:56 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[event management]]></category>
		<category><![CDATA[event monitoring]]></category>
		<category><![CDATA[it disasters]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8871</guid>
		<description><![CDATA[Knowing what&#8217;s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room! Using &#8230;]]></description>
				<content:encoded><![CDATA[<p>Knowing what&#8217;s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room!</p>
<p>Using comprehensive system monitoring tools to filter, sort and display the millions of system events is an excellent way to stay on top of a busy network. These tools allow you to quickly assess the state of your network and spot problems or security breaches before or as they happen. By seeing and acting on warning signs, you can prevent them from becoming critical issues.</p>
<p><a href="http://www.youtube.com/watch?v=7beErqkLq-0">http://www.youtube.com/watch?v=7beErqkLq-0</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-event-monitoring-can-prevent-it-disasters/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Email security solutions: On-premise vs. hosted</title>
		<link>http://www.gfi.com/blog/email-security-solutions-on-premise-vs-hosted/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-security-solutions-on-premise-vs-hosted</link>
		<comments>http://www.gfi.com/blog/email-security-solutions-on-premise-vs-hosted/#comments</comments>
		<pubDate>Thu, 14 Jun 2012 08:06:18 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Messaging]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[cloud email secuirity]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[email security service]]></category>
		<category><![CDATA[email security software]]></category>
		<category><![CDATA[hosted email security]]></category>
		<category><![CDATA[on-premise email security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8791</guid>
		<description><![CDATA[Email security is available both as an online service and as an on-premise solution &#8212; but which is a better fit for your business? Learn which delivery model is best for you through this quick video. http://www.youtube.com/watch?v=lLC5Vaf_j-c]]></description>
				<content:encoded><![CDATA[<p>Email security is available both as an online service and as an on-premise solution &#8212; but which is a better fit for your business? Learn which delivery model is best for you through this quick video.</p>
<p><a href="http://www.youtube.com/watch?v=lLC5Vaf_j-c">http://www.youtube.com/watch?v=lLC5Vaf_j-c</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/email-security-solutions-on-premise-vs-hosted/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Ten things administrators should never do</title>
		<link>http://www.gfi.com/blog/ten-things-administrators-should-never-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ten-things-administrators-should-never-do</link>
		<comments>http://www.gfi.com/blog/ten-things-administrators-should-never-do/#comments</comments>
		<pubDate>Wed, 06 Jun 2012 12:56:30 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[network administrators]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[security mistakes]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8744</guid>
		<description><![CDATA[Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There &#8230;]]></description>
				<content:encoded><![CDATA[<p>Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There are many efficiencies you can achieve without causing trouble; this is a list of things that are definitely not in that category.</p>
<p><a href="http://www.youtube.com/watch?v=FzKSlsOgt5Q">http://www.youtube.com/watch?v=FzKSlsOgt5Q</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/ten-things-administrators-should-never-do/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 07:59:13 by W3 Total Cache --