<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog</title>
	<atom:link href="http://www.gfi.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Layered Security: Essential for a Safe Company Network</title>
		<link>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=layered-security-essential-for-a-safe-company-network</link>
		<comments>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/#comments</comments>
		<pubDate>Fri, 13 Sep 2013 15:57:52 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[blackhole exploit kit]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[layered security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware as a service]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[viruses]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10867</guid>
		<description><![CDATA[Long gone are the days when system security was about little more than choosing an effective antivirus product. Threats to IT security now come from several different angles, and companies wishing to avoid the costs and reputational damage associated with &#8230;]]></description>
				<content:encoded><![CDATA[<div id="attachment_9396" class="wp-caption alignright" style="width: 345px"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/09/david-attard.jpg"><img class=" wp-image-9396     " alt="David Attard, Product Manager for GFI WebMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2012/09/david-attard.jpg" width="335" height="223" /></a><p class="wp-caption-text">David Attard, Product Manager for GFI WebMonitor</p></div>
<p>Long gone are the days when system security was about little more than choosing an effective antivirus product.</p>
<p>Threats to IT security now come from several different angles, and companies wishing to avoid the costs and reputational damage associated with security breaches must take a multi-faceted approach.</p>
<p>In this article, we speak to David Attard, a GFI product manager specializing in Web security, about the threats facing modern, connected businesses.<span id="more-10867"></span></p>
<h2>How has the IT security landscape changed in recent years?</h2>
<p>The biggest change has been a move away from traditional viruses and Trojans. Of course these still exist, and there are multitudes of them, but some of the scariest threats nowadays are those posed by social engineering and phishing, which take advantage of user naivety rather than holes in an infrastructure. Moreover, malware is pushed aggressively to victims. Rather than a chance encounter with a virus on a dodgy website, even the most educated and wary of users are likely to encounter malware being pushed to them via what is perceived as “normal” web browsing such as search engines, news and social networking sites.</p>
<p>Also, there are various downloads which are likely to contain malware. Research by Microsoft suggests that 1 in 14 downloads is actually malicious.</p>
<h2>How should IT departments respond to this?</h2>
<p>It’s now essential that companies take a multi-layered view of IT security. At the top level, this means doing all you can to prevent users accessing compromised areas of the Web by using content filtering &#8211; but it shouldn’t stop there.</p>
<p>If users <i>are</i> able to inadvertently access a malware-infected site, companies need to know that their machines are sufficiently patched and protected to prevent hackers taking advantage of exploits.</p>
<p>Finally, businesses need to ensure that other routes into the network are protected; there’s no point in having perfect Web security if a user can introduce malware by plugging in an infected USB stick or connecting their personal laptop or other device to the network without any mitigating security practices in place.</p>
<h2>Do businesses have good reason to be alarmed by how malware is evolving?</h2>
<p>If they’re not protected at every level, then definitely. Phishing is a particular concern, as compromised sites can look so genuine that they fool a large proportion of people. Obviously the ideal scenario is to use software that protects users from being tricked in the first instance, but user education is clearly very important too.</p>
<p>You only have to look at how many high-profile Twitter accounts have been hacked to know how real this threat is. The Syrian Electronic Army compromised many accounts with targeted phishing emails that convinced people sufficiently to give up their credentials.</p>
<h2>Do SMEs need to worry as much as larger companies?</h2>
<p>Yes, <span style="text-decoration: line-through;">because (arguably)</span> they are easier targets, with smaller budgets for IT security and it is essentially a game of numbers. Create large scale scatter shot and many victims are bound to get caught in the crossfire. We are also seeing a trend towards Advanced Persistent Threats (APTs), where hackers persistently target a company with a range of different attacks, including social engineering, in an attempt to gain system access.</p>
<p>Once they’re in there’s plenty they can do. Hackers can even access “malware as a service” such as the Blackhole Exploit Kit, which effectively allows them to design and distribute malware to meet their own ends with very little effort and at a very cost-effective price.</p>
<h2>What’s the best advice you could give to an IT department concerned about these issues?</h2>
<p>Use a product such as <a href="https://www.gficloud.com/land/gfi-cloud-unified?adv=13558&amp;loc=53 ">GFI Cloud</a> that can integrate patch management, antivirus and from early October, content filtering in one easy to use, web-based console. Only by thinking of every possible “way in” can IT professionals really sleep soundly at night!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/layered-security-essential-for-a-safe-company-network/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Not Again! Problems with Office Patches</title>
		<link>http://www.gfi.com/blog/not-again-problems-with-office-patches/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=not-again-problems-with-office-patches</link>
		<comments>http://www.gfi.com/blog/not-again-problems-with-office-patches/#comments</comments>
		<pubDate>Fri, 13 Sep 2013 13:00:23 +0000</pubDate>
		<dc:creator>Debra Littlejohn Shinder</dc:creator>
				<category><![CDATA[GFI Patch Central]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[KB2760411]]></category>
		<category><![CDATA[KB2760583]]></category>
		<category><![CDATA[KB2760588]]></category>
		<category><![CDATA[KB28100009]]></category>
		<category><![CDATA[KB2871630]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Office]]></category>
		<category><![CDATA[Microsoft Office programs]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[TechNet]]></category>
		<category><![CDATA[windows update]]></category>
		<category><![CDATA[WSUS]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10862</guid>
		<description><![CDATA[Patch Tuesday hasn’t been going so well lately. Last month, Microsoft had to recall patches that caused problems with Exchange and ADFS. This month, Microsoft issued a number of patches designed to fix security vulnerabilities in Microsoft Office programs, but &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/PatchTuesdayProblemsOfficePatches.jpg"><img class=" wp-image-10864 alignright" style="border: 0px solid black; margin: 10px;" alt="PatchTuesdayProblemsOfficePatches" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/PatchTuesdayProblemsOfficePatches.jpg" width="192" height="192" /></a>Patch Tuesday hasn’t been going so well lately. Last month, Microsoft had to recall patches that caused problems with Exchange and ADFS. This month, Microsoft issued a number of patches designed to fix security vulnerabilities in Microsoft Office programs, but one has been pulled and there are still problems being reported with some of the others.<span id="more-10862"></span></p>
<p>KB2871630 was a non-security patch that was intended to address problems with performance and stability. But after it was installed, users discovered that the folder pane in Outlook 2013 was empty.  This made for some very unhappy customers, although uninstalling the patch does return the folder pane intact. The update was removed from Windows Update and WSUS. <a href="http://blogs.technet.com/b/office_sustained_engineering/archive/2013/09/11/outlook-folder-pane-disappears-after-installing-september-2013-public-update.aspx">Microsoft published a blog post on TechNet about the issue.</a></p>
<p>Meanwhile, some users are reporting an “endless loop” problem whereby some of the other patches keep installing over and over. This has been reported in regard to KB2760411, KB2760588 and KB2760583. In addition, some are getting an error message when they try to install KB28100009.</p>
<p>Stay tuned and we’ll let you know of any new developments.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/not-again-problems-with-office-patches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>September Patch Tuesday</title>
		<link>http://www.gfi.com/blog/september-patch-tuesday-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=september-patch-tuesday-2</link>
		<comments>http://www.gfi.com/blog/september-patch-tuesday-2/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 14:24:13 +0000</pubDate>
		<dc:creator>Debra Littlejohn Shinder</dc:creator>
				<category><![CDATA[GFI Patch Central]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10861</guid>
		<description><![CDATA[We’re kicking off the Patch Central blog with a fairly hefty Patch Tuesday from Microsoft. This month brings us fourteen security bulletins, half of which pertain to Microsoft Office. The good news is that those who are using the latest &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/microsoftnew.jpg"><img class="alignright size-medium wp-image-10787" alt="microsoftnew" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/microsoftnew-300x240.jpg" width="300" height="240" /></a>We’re kicking off the Patch Central blog with a fairly hefty Patch Tuesday from Microsoft. This month brings us fourteen security bulletins, half of which pertain to Microsoft Office. The good news is that those who are using the latest version, Office 2013, aren&#8217;t affected by most them; all but one of the vulnerabilities that are addressed are in Office 2003, 2007 and 2010.</p>
<p>Only four of the September patches are rated critical, although eight carry the possibility of remote code execution and three others present the risk of elevation of privileges. Supported Windows operating systems, from XP to Windows 8/RT, are affected by one or more of these updates.</p>
<p>We’ll take a brief look at each of the updates individually, beginning with those rated critical. Unless otherwise indicated, the patches apply to both 32 and 64 bit operating systems. All of these patches may require a system restart after installation. For more details about each update, see the Microsoft Security Bulletin (linked).</p>
<p><b>CRITICAL</b></p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-067"><b>MS13-067 (KB2834052)</b></a><b> </b>Affects SharePoint Portal Server 2003 SP3, SharePoint Server 2007 SP3, SharePoint Server 2010 SP1, SharePoint Server 2010 SP2, and SharePoint Server 2013 (including SharePoint Foundation 2013), along with Microsoft Office Web Apps 2010 SP 1 and 2, specifically the Excel and Word web apps. The Excel Services, Microsoft Business Productivity Servers component, and Word Automation Services On SharePoint Server 2007 and 2010 are impacted.  The critical rating applies to all the versions of SharePoint except SharePoint Server 2013, for which it is rated important.</p>
<p>This update addresses ten vulnerabilities that include the possibility of remote code execution. It corrects the problem by enabling machine authentication check (MAC) and making corrections to the way SharePoint, Microsoft Office Services and Web apps handle request sanitization, undefined workflows and parsing of specially crafted files.</p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-068"><b>MS13-068 (KB2756473)</b></a><b> </b>Affects supported versions of Office 2007 and 2010, specifically Outlook. It does not affect Office 2003 SP1 or Office 2013/2013 RT, nor does it affect editions of Office that don’t include Outlook. It’s rated critical for all affected software.</p>
<p>This update addresses one vulnerability in Microsoft Outlook that was privately reported by Alexander Kink of n.runs AG. If a user opens a specially crafted email message in an affected version of Outlook, it could result in remote code execution. The update corrects the way Outlook parses specially crafted S/MIME messages. <b></b></p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-069"><b>MS13-069 (KB2870699)</b></a><b> </b>Affects all currently supported versions of Internet Explorer (6, 7, 8, 9 and 10) running on all currently supported and released operating systems. It does not affect Internet Explorer 11, which is available as a developer preview and as part of the (not yet released) Windows 8.1 and Windows Server 2012 R2 operating systems. It also does not affect Server Core installations, which do not include the web browser. The critical rating applies to IE running on client operating systems (XP, Vista, Windows 7, 8 and RT). It is rated critical for IE on server operating systems.</p>
<p>This is a cumulative security update for IE that also addresses 10 vulnerabilities that were privately reported through HP’s Zero Day Initiative and by Google Security Team members, which could result in remote code execution.</p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-070"><b>MS13-070 (KB2876217)</b></a><b> </b>Affects supported versions of Windows XP and Windows Server 2003 only. Other versions of Windows client and server operating systems are not affected. The critical rating applies to all affected operating systems.</p>
<p>This update addresses a vulnerability that was reported privately by a member of HP’s Zero Day Initiative, which could result in remote code execution. The exploit would involve a specially crafted OLE file that would need to be opened by the user for a successful attack.</p>
<p><b>IMPORTANT</b></p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-071"><b>MS13-071 (KB2864063)</b></a><b> </b>Affects supported versions of Windows XP and Vista, as well as supported versions of Server 2003 and 2008 (except Server Core installation). Does not affect later released operating systems (Windows 7, 8, RT and Windows Server 2008 R2 or Server 2012). Also does not affect operating systems currently in preview (Windows 8.1 and Server 2012 R2). It’s rated important, rather than critical, because user action is required for an attack to succeed.</p>
<p>This update addresses another privately reported vulnerability that could allow remote code execution. In this case, it’s accomplished by getting a user to apply a Windows theme that is specially crafted by the attacker.  The update corrects the way theme files and screensavers are handled.</p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-072"><b>MS13-072 (KB2845537)</b></a><b> </b>Affects supported versions of Microsoft Office 2003, 2007 and 2010, specifically Microsoft Word. The Microsoft Office Compatibility Pack SP3 (which is used to open the new XML-based Office format files with older versions of Office) and the Microsoft Word Viewer that’s used to open Word documents without having Word installed. Office 2013 (including 2013 RT) is not affected, nor is Office for Mac 2011. It’s rated Important for all affected software.</p>
<p>This update addresses thirteen vulnerabilities that were reported by members of the Google Security Team and Positive Technologies personnel. Opening a specially crafted file in an unpatched, affected version of Word or Word Viewer could allow remote code execution. The update corrects the way the XML parser in Word parses these files.</p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-073"><b>MS13-073 (KB2858300)</b></a><b> </b>Affects supported versions of Microsoft Office 2003, 2007, 2010 and 2013 (including 2013 RT), specifically Microsoft Excel. The Compatibility Pack SP3 and Excel Viewer are also affected, and in this case Office for Mac 2011 is also affected. It’s rated Important for all affected software.</p>
<p>This update addresses three vulnerabilities that were privately reported by members of CERT/CC and Positive Technologies. Opening a specially crafted file in an affected version of Excel or Excel Viewer could result in remote code execution. The update corrects the way the XML parser in Excel handles these files.</p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-074"><b>MS13-074 (KB2848637)</b></a><b> </b>Affects supported versions of Office 2007, 2010 and 2013, specifically Microsoft Access. Does not affect Office 2003 SP3. Also does not affect editions of Office that don’t include Access (such as Office 2013 RT and Office for Mac 2011, or the Home and Student editions, etc.). It’s rated Important for all affected software.</p>
<p>This update addresses three vulnerabilities that were privately reported by a member of Secunia SVCRP.  Opening a specially crated file in an affected version of Access could result in remote code execution. The update corrects the way the XML parser in Access handles these files.</p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-075"><b>MS13-075 (KB2878687)</b></a><b> </b>Affects Microsoft Office 2010 SP1 only, with Pinyin IME (Simplified Chinese).  Microsoft Office 2010 SP2 is not affected, nor are supported versions of Office 2007 and 2013/2013 RT. Other versions of the Simplified Chinese IME are not affected. It’s rated important for affected software.</p>
<p>This update addresses a vulnerability in the Office Pinyin Input Method Editor component for the Simplified Chinese language that was privately reported by Wei Wang of VulnHunt. It can be exploited by launching IE from the toolbar on a computer running the Simplified Chinese Pinyin IME, which could allow the attacker to run code in kernel mode. The update corrects the way the IME exposes configuration options.</p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-076"><b>MS13-076 (KB2876315)</b></a><b>  </b>Affects all currently supported released versions of Windows client and server operations systems (XP, Vista, Windows 7, 8 and RT as well as Server 2003, 2008/2008 R2, and 2012), including Server Core installations. Preview versions of Windows 8.1/8.1 RT and Server 2012 R2 are not affected. It’s rated important for all affected software.</p>
<p>This update addresses seven vulnerabilities that were privately reported by Google and Qihoo 360 Security Center personnel. If an attacker is able to log onto the system and run a specially crafted application, this could result in elevation of privileges. The update fixes the problem by correcting the way the kernel-mode driver handles objects in memory.</p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-077"><b>MS13-077 (KB2872339)</b></a><b> </b>Affects Windows 7 SP1 and Server 2008 R2 SP1, including Server Core installations. Other versions of Windows client and server (XP, Vista, Windows 8 and RT, Server 2003, 2008, and 2012) are not affected.  Preview versions of Windows 8.1/8.1 RT and Server 2012 R2 are also not affected. It’s rated important for affected software.</p>
<p>This update addresses one vulnerability that was privately reported. An attacker would have to persuade an authenticated user to execute an application or be able to log on locally in order to successfully exploit it, in which case it could result in elevation of privileges. The update fixes the problem by correcting the way the Service Control Manager handles objects in memory.</p>
<p><a href="http://technet.microsoft.com/en-us/security/bulletin/ms13-078"><b>MS13-078 (KB2825621)</b></a><b> </b>Affects FrontPage 2003 SP3. It does not affect any version of Microsoft SharePoint Designer. It’s unclear from the bulletin whether Expression Web is affected. It’s rated important.</p>
<p>This update addresses one vulnerability that was privately reported by a member of Positive Technologies. If a user opened a specially crafted FrontPage file with the affected software, it could result in disclosure of information. The update fixes the problem by correcting the way FrontPage handles Document Type Definitions (DTD).<b> </b></p>
<p><a href="https://technet.microsoft.com/en-us/security/bulletin/ms13-079"><b>MS13-079 (KB2853587)</b></a><b>  </b>Affects supported versions of Windows Vista, 7 and 8, as well as Server 2008 and 2008 R2 for x86 and x64 and 2012. This includes Server Core installations. It does not affect supported released versions of XP or RT, nor Server 2003, 2008 and 2008 R2 for Itanium. It also does not affect preview versions of Windows 8.1/8.1 RT or Server 2012 R2 (including Server Core). It’s rated important.</p>
<p>This update addresses one vulnerability in Active Directory that was privately reported. If an attacker sends a specially crafted query to the LDAP service in AD, it could result in a denial of service (DoS) attack. The update fixes the problem by correcting the way LDAP handles such queries.</p>
<p><b>SUMMARY</b></p>
<p>This will be a moderately heavy patching load for organizations running the affected versions of Windows and Microsoft Office. We will be keeping an eye out for any problems that might emerge with any of these patches and will report them here on this blog. We’ll also be posting a summary of some of the most important third party patch releases for the month, and other patch-related news, so please stay tuned.</p>
<p><em>New update since this month&#8217;s Patch Tuesday: <a href="http://www.gfi.com/blog/not-again-problems-with-office-patches/">see here</a>  </em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/september-patch-tuesday-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Patch Management Made Easy!</title>
		<link>http://www.gfi.com/blog/patch-management-made-easy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=patch-management-made-easy</link>
		<comments>http://www.gfi.com/blog/patch-management-made-easy/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 14:00:26 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Automated Software Patching]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Based Patch Management]]></category>
		<category><![CDATA[Cloud Solutions]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT resources]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[web-based interface]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10848</guid>
		<description><![CDATA[Any system admin worth their salt knows that the time-consuming process of installing new software is only the tip of the iceberg. The real drain on your IT resources comes from managing and administering that software. Why? Because effective patch &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Patch-Management-Cloud.jpg"><img class="wp-image-10849 alignright" style="border: 0px solid black; margin: 10px;" alt="Patch Management Cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Patch-Management-Cloud.jpg" width="216" height="216" /></a>Any system admin worth their salt knows that the time-consuming process of installing new software is only the tip of the iceberg. The real drain on your IT resources comes from managing and administering that software.<span id="more-10848"></span></p>
<p>Why? Because effective patch management is an essential component for the maintenance of a safer network. Unpatched software and operating systems can have vulnerabilities which in turn can be exploited during a malicious attack on your system.</p>
<p>2012 saw a total 4,347 new security vulnerabilities reported, that’s around 12 every day that system admins need to be aware of and repair across an entire network.  And with more and more employees bringing their own devices to plug in to business networks, the risk is even greater.</p>
<p>So, if patch management is essential, how can you handle it more efficiently?</p>
<h2>The Evils of Automated Software Patching</h2>
<p>Yes, it is true that almost every application now comes with automated patch management. However, relying on this method to keep your software updated could leave you exposed. Automated services require a user to be connected to the Internet and to accept the installation of the update, rather than skipping it.</p>
<p>Can the onus be put onto users to take care of their own machines?</p>
<p>A Skype survey of US, UK and German consumers showed that 40% of respondents don&#8217;t update their machines when prompted. Almost 25% required a second prompt. Around 45% were actually worried that installing the update would weaken their computer&#8217;s security.</p>
<p>To counter this system admins must check each machine individually to ensure they are all patched and running the latest software versions. That is a hugely resource-intensive for small IT departments and virtually impossible for a single person to accomplish.</p>
<p>On occasion, some patches may cause instability in a machine. The Microsoft MS10-015 patch for Windows XP that was released in February 2010 is one great example. It caused systems to crash and the patch was suspended. Just last month,  the MS-13-061/KB2876216 update caused corruption of the Exchange index database,  and the  KB 2843638, 2843639 and 2868846 caused the Active Federation Services (ADFS) to stop working. Workarounds and additional install instructions were issued for the problematic patches &#8211; but how many users know how to roll back patches? And how many will even realize they installed a patch in the first place?</p>
<p>That adds up to even more work for already busy IT managers.</p>
<h2>Cloud-Based Patch Management</h2>
<p>GFI Cloud™ is a simple web-based interface for integrated antivirus, asset tracking, network monitoring and remote control.</p>
<p>Using a cloud-based patch management system offers you a wide range of advantages. Firstly, it provides you with a single, central point of control. There is no more hunting around machines to see which one is patched and which one is not. You get a single interface that collects and collates that information for you.</p>
<p>You can patch machines from the console, which removes the need for users to make decisions. That enables you to patch machines faster and ensure that vulnerabilities are kept to a minimum.</p>
<p>Even better, cloud solutions are scalable so they can grow with your needs. Perhaps most importantly, they are also cost effective and won&#8217;t require you to upgrade your machines to run. You can deploy the solution within minutes and quickly get clear insight in to the status of your network.</p>
<p><b><i>Try GFI Cloud patch management <a href="http://www.gficloud.com/land/new-patch-management/?adv=13558&amp;loc=56">free for 30 days.</a></i></b><b><i></i></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/patch-management-made-easy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI MailArchiver App for Windows 8</title>
		<link>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailarchiver-app-for-windows-8</link>
		<comments>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 13:27:36 +0000</pubDate>
		<dc:creator>Kate Bolton</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10858</guid>
		<description><![CDATA[According to IDC, tablet sales are going to supersede laptop sales in 2013 and “the entire PC market by 2015”. This means that apps can no longer be designed in the traditional way with a title bar, menu bar and desktop &#8230;]]></description>
				<content:encoded><![CDATA[<p>According to <a href="http://news.cnet.com/8301-1035_3-57586388-94/tablet-shipments-to-surpass-all-pcs-by-2015-idc-says/">IDC</a>, tablet sales are going to supersede laptop sales in 2013 and “the entire PC market by 2015”.</p>
<p style="text-align: center;"><img class="wp-image-10859 aligncenter" alt="shot1" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/shot1.jpg" width="470" height="294" /></p>
<p>This means that apps can no longer be designed in the traditional way with a title bar, menu bar and desktop approach. Apps have to be tailored for touch and be able to run from tablets. Windows 8 has brought about a new way of looking at apps. The new modern interface’s tiles and buttons are literally asking the user to touch and press them.</p>
<p>The new interface has not been to everyone’s liking and many have complained and expressed their frustration, but it’s a whole new set of ideas and users need to adjust to them to fully understand their potential. But once you get used to tablets you understand why it’s more natural to press a button with your finger than to move the mouse and click on it.</p>
<p>At GFI we always strive to keep up to date with new technologies and today we are releasing our first Windows 8 Modern UI app. This app for GFI MailArchiver makes it possible to connect to your email archive from your Windows 8 tablet/PC or your Windows RT tablet.  This adds to the different apps and methods that you can use to connect to GFI MailArchiver to browse and search the archive.</p>
<p>The app makes it very easy to search and browse the archive. We have also made it simple to search for the people you communicate with the most, or to save your own custom searches. <a href="http://apps.microsoft.com/windows/app/gfi-mailarchiver/a9cf75a8-7d7e-4f2a-af44-ca316548e3c2">Why not check it out?</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailarchiver-app-for-windows-8/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The End of Patching is in Sight for Windows® XP</title>
		<link>http://www.gfi.com/blog/the-end-of-patching-is-in-sight-for-windows-xp/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-end-of-patching-is-in-sight-for-windows-xp</link>
		<comments>http://www.gfi.com/blog/the-end-of-patching-is-in-sight-for-windows-xp/#comments</comments>
		<pubDate>Tue, 10 Sep 2013 14:28:00 +0000</pubDate>
		<dc:creator>Debra Littlejohn Shinder</dc:creator>
				<category><![CDATA[GFI Patch Central]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[Windows XP]]></category>
		<category><![CDATA[XP systems]]></category>
		<category><![CDATA[XP users]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10854</guid>
		<description><![CDATA[You can’t claim you didn’t have plenty of warning: Microsoft™ announced way back in 2011 that the end of extended support for Windows XP would come in 2014. Full mainstream support ended in 2009, but security updates have kept on &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Windows-XP.png"><img class="wp-image-10855 alignright" style="border: 0px solid black; margin: 10px;" alt="Windows XP" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Windows-XP.png" width="234" height="171" /></a>You can’t claim you didn’t have plenty of warning: Microsoft™ announced way back in 2011 that the end of extended support for Windows XP would come in 2014. Full mainstream support ended in 2009, but security updates have kept on coming. Even so, according to a recent IDC study, XP gets 27 percent more virus attacks than Windows 7 and the average time to repair a malware attack is over 7 times as long. Supporting an aging operating system is expensive, and the price will go up next April, when security fixes stop (for all but a few select organizations with very deep pockets).<span id="more-10854"></span></p>
<p>There are a number of reasons that some companies have made the decision to hang onto XP until the very end. Change is never easy; in the IT world, it often means hidden costs, a steep learning curve (for both admins and users) and unexpected bumps in the road in the form of hardware and software incompatibilities. No wonder the philosophy of “if it’s not broke, don’t fix it” is popular. The problem is that a Windows XP that’s frozen in time in terms of security is going to be irretrievably broken.</p>
<p>Some XP users have been in denial, even speculating that there would be a last-minute “bailout” to extend support if only enough individuals and companies are still using XP when the deadline arrives. Even some experts believed, less than a year ago, that Microsoft would “<a href="http://www.computerworld.com/s/article/9234316/Experts_question_Microsoft_s_decision_to_retire_XP?pageNumber=1">have no choice but to continue supporting XP</a>.”  However, Microsoft has made it clear that they are serious about XP’s end of life date. <a href="http://www.zdnet.com/microsofts-custom-windows-xp-patches-not-a-panacea-7000020074/?s_cid=e019&amp;ttag=e019">Critical updates will be provided only to companies with Premier Support contracts</a> who also purchase a Custom Support option. Few companies can afford that, with fees reportedly <i>starting </i>at more than half a million dollars per year.</p>
<p>What does this mean to everyone else? To hackers, it means a golden opportunity. To Windows XP users, from home to enterprise, it means no more patches. It means any new vulnerabilities that are discovered will be wide open for attackers to exploit, unless third parties take it upon themselves to create fixes. That may not be possible even if there are third parties who want to take on the expense (and possible liability) of doing it. Because Windows source code is closed, those outside the company can’t legally modify it without Microsoft’s permission.</p>
<p>Although security <a href="http://www.symantec.com/business/support/index?page=content&amp;id=TECH204937">companies such as Symantec have announced that they will continue to release antivirus definitions for XP “for the current product cycle</a>,” they also caution that the lack of OS and application patches will still negatively impact the security level of Windows XP systems. McAfee says they will continue to support XP SP3 after April <a href="http://kc.mcafee.com/corporate/index?page=content&amp;id=KB78434">“for a limited time, as long as it is technically and commercially reasonable.”</a> In the security ecosystem, AV, antimalware, vendor-provided updates and other security mechanisms must work together in a multi-layered security approach.</p>
<p>All of this means the potential for huge hits to the bottom line due to downtime and lost productivity when (not “if”) unprotected XP systems are compromised. And it’s not only about direct monetary loss. If unpatched systems result in exposure of client data, companies may find themselves not only losing business, but in violation of the law. In regulated industries, companies have a legal obligation to reasonably protect such data and not doing so could subject you to fines or even criminal charges.  In any industry, failure to secure systems could be viewed as negligence, resulting in civil lawsuits.</p>
<p>Statutory requirements in some countries, such as the U.K., explicitly impose a duty to have “modern and up-to-date software” as part of privacy laws. In other countries, such as the U.S., the standard is based on what would be considered reasonable and prudent and thus is open to interpretation by the courts. Even if a company escapes legal repercussions in the wake of an XP-related breach, media attention can drive customers away. Trust is a big factor in the business/customer relationship and a major security breach can damage a company’s reputation in ways from which it may never recover.</p>
<p>According to the August statistics from <a href="http://www.netmarketshare.com/">NetMarketShare</a>, slightly more than a third of PCs worldwide (33.66 percent) were still running Windows XP and the <a href="http://articles.washingtonpost.com/2013-08-04/business/41067625_1_windows-xp-upgrades-microsoft-rob-enderle">Washington Post reported that Microsoft’s own statistics show about 30 percent of SMB customers haven’t yet upgraded</a>. It’s time for the companies in that position to develop a plan – sooner rather than later.</p>
<p><b><i>GFI Cloud™ is offering <a href="http://www.gficloud.com/asset-tracking">free asset tracking</a> which will help you start your plan by finding out which workstations are still using Windows XP. </i></b></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-end-of-patching-is-in-sight-for-windows-xp/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Are You Ready for 2014? GFI LanGuard® 2014 Is!</title>
		<link>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-ready-for-2014-gfi-languard-2014-is</link>
		<comments>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/#comments</comments>
		<pubDate>Tue, 10 Sep 2013 11:14:13 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[GFI LanGuard 2014]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[network administrators]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10851</guid>
		<description><![CDATA[We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&#38;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release. Q: How is GFI LanGuard adapting to the changes that &#8230;]]></description>
				<content:encoded><![CDATA[<p><i><br />
We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&amp;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release.<span id="more-10851"></span></i></p>
<h2><b>Q: How is GFI LanGuard adapting to the changes that happen so fast in the IT infrastructure landscape nowadays?</b></h2>
<div id="attachment_10852" class="wp-caption alignright" style="width: 317px"><a style="color: #ff4b33;" href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg"><img class="wp-image-10852 " alt="Cristian Florian" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg" width="307" height="197" /></a><p class="wp-caption-text">Cristian Florian, Product Manager for GFI LanGuard</p></div>
<p>IT environments now include so many different devices, operating systems and applications that network administrators may not even be aware of all of them. The rise in BYOD (Bring Your Own Device) in business environments has added to the burden system administrators have to carry every day, in turn forcing them to stay on top of their network environment, strengthen security, while also monitoring an ever-changing network infrastructure.</p>
<p>So we built GFI LanGuard 2014 with this in mind. We had to extend its capability in this new environment because the whole IT infrastructure needs to be managed, no matter if we are talking about Windows®, Mac OS® or Linux® systems, physical or virtual machines, servers, desktops, laptops, mobile devices such as smartphones and tablets, or network devices such as routers, switches and printers.</p>
<h2><b>Q: What is new in GFI LanGuard 2014?</b></h2>
<p>One of the major things we added in GFI LanGuard 2014 is vulnerability assessment for smartphones and tablets. According to a <a href="http://www.ciscomcon.com/sw/swchannel/registration/internet/registration.cfm?SWAPPID=91&amp;RegPageID=350200&amp;SWTHEMEID=12949&amp;traffictype=Direct" target="_blank">survey conducted by Cisco</a>, 90 percent of American employees use their personal smartphone for work purposes. While this is an opportunity for businesses, it also adds risk, as these devices may have access to sensitive company information and there is little, if any, visibility into how security is managed for them.</p>
<p>GFI LanGuard now allows network administrators to see when and what devices connect to the Microsoft Exchange servers and it checks these devices for security vulnerabilities. Android®, iOS® and Windows Phone® are supported. Additionally GFI LanGuard will report when new mobile operating systems updates are available and makes it very easy for network administrators to send email notifications to device owners alerting them that these updates are available.</p>
<h2><b>Q: How does vulnerability assessment for mobile devices work? Do network administrators need to install anything on the smartphones?</b></h2>
<p>No. Auditing of smartphones and tablets using GFI LanGuard is very easy. Mobile devices that connect to the company’s Microsoft Exchange servers are detected using agent-less scans. There is nothing to install on smartphones, tablets or the Microsoft Exchange server.</p>
<p>The only thing that needs to be set is the Microsoft Exchange server name and credentials that have access to it.</p>
<h2><b>Q: Are there any enhancements on the patch management side?</b></h2>
<p>Yes. We are continuously improving our patch management capabilities. GFI LanGuard 2014 comes with patch management support for major Linux distributions such as Red Hat Enterprise Linux, Ubuntu, Suse, OpenSuse, CentOS and Debian.</p>
<p>According to <a href="http://whitepapers.theregister.co.uk/paper/view/2932/the-end-user-security-jigsaw.pdf" target="_blank">a recent survey from Freeform Dynamics Ltd</a> on 977 IT and business professionals representing a range of organization sizes and industries, 62.6% of them have at least one Linux system in their organization.</p>
<p>Now customers can use GFI LanGuard as a central console to patch Windows, Mac OS and Linux operating systems and applications. And, speaking of applications, it is now easier than ever for IT administrators to keep their systems fully patched, as we added a host of third-party applications to our “supported list”.</p>
<h2><b>Q: What new third party applications are supported?</b></h2>
<p>We added support for more than 20 new applications, bringing the total to over 50 third-party applications (besides Microsoft applications). We are practically covering all the most important ones in terms of popularity and security relevance.</p>
<p>Among the new applications we support are Pidgin (instant messaging), CDBurnerXP, ImgBurn and CCleaner (utilities), VLC and Audacity (media), LibreOffice (documents), Paint.NET and  IrfanView (imaging), Adobe Illustrator, Adobe PhotoShop and Adobe InDesign (Adobe Creative Suite), WinSCP and Core FTP (FTP clients), Python and Notepad++ (developer tools). The complete list is available <a href="http://www.gfi.com/support/products/gfi-languard/KBID003469" target="_blank">here</a>.</p>
<p>We will continue to add support for new applications at a high rate. Customers can request support for additional applications by sending an email <a href="mailto:FeedbackLNSS@gfi.com" target="_blank">to this address</a>.</p>
<h2><b>Q: Anything else worth mentioning?</b></h2>
<p>Yes, we have some other good news for our customers. We have a special offer for anyone who purchases or upgrades their GFI LanGuard version to 2014. They will automatically receive 25% extra nodes for free to use exclusively on mobile devices auditing.</p>
<p><em><strong>So check out the new <a href="http://www.gfi.com/land/Home/adv/lanss/Scan-your-network-effortlessly?adv=13558&amp;loc=49" target="_blank">GFI LanGuard</a> version. We are proud of what we have accomplished and we believe that our users will enjoy it too.</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Porn in Parliament – Also in Your Office?</title>
		<link>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=porn-in-parliament-also-in-your-office</link>
		<comments>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/#comments</comments>
		<pubDate>Fri, 06 Sep 2013 12:00:46 +0000</pubDate>
		<dc:creator>David Attard</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[block categories]]></category>
		<category><![CDATA[Freedom of Information Act]]></category>
		<category><![CDATA[GFI WebMonitor]]></category>
		<category><![CDATA[Houses of Parliament]]></category>
		<category><![CDATA[Monitoring Internet activity]]></category>
		<category><![CDATA[porn]]></category>
		<category><![CDATA[Porn Parliament]]></category>
		<category><![CDATA[undesirable websites]]></category>
		<category><![CDATA[web browsing]]></category>
		<category><![CDATA[web browsing security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10818</guid>
		<description><![CDATA[It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/porn.jpg"><img class="alignright  wp-image-10819" style="border: 0px solid black; margin: 10px;" alt="porn" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/porn.jpg" width="288" height="190" /></a>It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, <a href="http://www.huffingtonpost.co.uk/2013/09/03/parliament-porn-websites_n_3859837.html" target="_blank">official figures released under the Freedom of Information Act</a> show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.<span id="more-10818"></span></p>
<h2><b>Why does this happen?</b></h2>
<p>It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge.</p>
<h2><b>What should you be thinking about?</b></h2>
<p>Even though employees in the Houses of Parliament probably had a good idea that their online activity was monitored, it didn’t prevent them from attempting to access adult material. Moving away from the topic of porn and MPs in the UK, and looking at matters closer to home, how can you prevent something similar from happening?</p>
<p>What can you do to make sure that your staff spend their time more efficiently and productively? Here are a few tips:</p>
<p>1)      First things first, if you don’t have a web filtering and monitoring system in place, then you really should implement one – unless you want to start wondering what each employee in doing online</p>
<p>2)      You need a web filtering solution which will allow you to drill-down exactly into what a specific user is doing, as given by example in this short video:  <a href="http://www.youtube.com/watch?v=gbWNLs4W5io" target="_blank">Monitoring Internet activity at the office</a>.</p>
<p>3)      Your web filtering should proactively advise and alert you when a user attempts to visit ‘naughty’ websites, or other illicit webpages, so that your HR department can decide whether or not to remind them of the company’s best practices on Internet usage.</p>
<p>4)      You should invest some time and resources discovering how much time users are spending on websites which are unrelated to their official duties.</p>
<p><a href="http://www.gfi.com/land/Home/adv/webmon/Get-advanced-web-filtering-for-your-business?adv=13558&amp;loc=50" target="_blank">GFI WebMonitor®</a> is an affordable solution that allows you to address all of the above. Besides the ability to block categories of undesirable websites, it is very easy to use the Activity dashboards and reports to identify employees whose time could be better spent working for you, than searching the web for themselves. Real-time configurable alerts allow you to send emails to the appropriate people when their online behaviour merits it. Search engine query monitoring, for example, will clearly show what a user’s intentions were and the appropriate department can take the necessary actions, including education, to ensure there are no repeat offenders. GFI WebMonitor offers companies many other benefits such as added web browsing security and mitigation of bandwidth issues.</p>
<p><em><strong><a href="http://www.gfi.com/land/Home/adv/webmon/Get-advanced-web-filtering-for-your-business?adv=13558&amp;loc=50" target="_blank">Try GFI WebMonitor for free for 30 days!</a></strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/porn-in-parliament-also-in-your-office/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Gold Award for GFI Cloud™ – WindowsNetworking.com</title>
		<link>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gold-award-for-gfi-cloud-windowsnetworking-com</link>
		<comments>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/#comments</comments>
		<pubDate>Fri, 06 Sep 2013 10:29:57 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT network]]></category>
		<category><![CDATA[manage IT]]></category>
		<category><![CDATA[Windows XP]]></category>
		<category><![CDATA[WindowsNetworking.com]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10814</guid>
		<description><![CDATA[Here at GFI Cloud we love our product as much as our customers. Now, even the tough reviewers at WindowsNetworking.com are talking about GFI Cloud. The reviewer, Brien M. Posey, was impressed by the speed of install across a variety &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/WN_Gold_200x117.jpg"><img class="alignright size-full wp-image-10815" style="border: 0px solid black; margin: 10px;" alt="WN_Gold_200x117" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/WN_Gold_200x117.jpg" width="200" height="117" /></a>Here at GFI Cloud we love our product as much as our customers. Now, even the tough reviewers at WindowsNetworking.com are talking about GFI Cloud.<span id="more-10814"></span></p>
<p>The reviewer, Brien M. Posey, was impressed by the speed of install across a variety of windows systems and servers and the really nice reporting feature. “All in all, I liked GFI Cloud. I found it easy to use” (See full review <a href="http://www.windowsnetworking.com/articles-tutorials/product-reviews/product-review-gfi-cloud.html" target="_blank">here</a>).</p>
<p>WindowsNetworking.com reviewed and assessed of each of GFI Cloud’s features:</p>
<ul>
<li>Asset Tracking</li>
<li>Monitoring</li>
<li>Patch Management</li>
<li>Antivirus</li>
</ul>
<p>The result: GFI Cloud earned the WindowsNetworking.com Gold Award.</p>
<p>Sign up for your <a href="http://www.gficloud.com/land/simplify-your-it/?adv=13558&amp;loc=58">free 30 day trial</a> and experience how the GFI Cloud platform.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gold-award-for-gfi-cloud-windowsnetworking-com/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>September Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/september-webcast-line-up-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=september-webcast-line-up-2</link>
		<comments>http://www.gfi.com/blog/september-webcast-line-up-2/#comments</comments>
		<pubDate>Wed, 04 Sep 2013 14:00:09 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[Message management solutions]]></category>
		<category><![CDATA[Multi-layer IT security]]></category>
		<category><![CDATA[security solutions]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10795</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! Don’t be an easy target! Multi-layer your IT security Date: &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="144" height="135" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10795"></span></p>
<h2>Don’t be an easy target! Multi-layer your IT security</h2>
<p><b>Date: September 19, 2013 – Time: 4 p.m. BST / 5 p.m. CEST – US: 8 a.m. PDT / 11 a.m. EDT</b></p>
<p>With the growth of targeted phishing attacks, Advanced Persistent Threats and even Malware as a Service how can small and mid-sized companies keep up? With tight budgets and IT professionals stretched, to cover more with less, what level of confidence do you have in your IT security? Infiltrating a bigger company takes much more effort, but a smaller business, with vulnerable defenses can make an easier target.</p>
<p>In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet-based and cyber-attacks. The basic methodology of each threat and how to mount effective counter measures, with a multi-layered approach to security.</p>
<p><b><a href="http://bit.ly/1909iPM">Register now</a></b></p>
<h2>Securing your IT infrastructure: Managing security solutions in a complex world</h2>
<p><b>Date: September 24, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>As the types and methods of security solutions become more diverse, the challenge to manage the network security infrastructure has grown exponentially. This webcast will look at the key challenges and offer solutions to some of the most pressing issues confronting network security professionals.</p>
<p>During this webcast we will cover vulnerability assessment, threat detection and network auditing. Additionally our presenter will examine patch management, compliance, inventory assessment and effective control of BYOD (Bring Your Own Device) threats to your security and how to use these techniques to assure your data is as safe as possible.</p>
<p><b><a href="http://bit.ly/1aPtA2o">Register now</a></b></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/september-webcast-line-up-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 19:30:04 by W3 Total Cache --