Latest posts

Page 2

Tonight’s forecast…cloudy with a chance of compromise!

Over the past few weeks we have seen data on cloud storage services being compromised. Does this mean you should not trust cloud services?

Continue reading

GFI MailEssentials wins another VBSpam+ award!

GFI MailEssentials has won its fourth VBSpam+ award from Virus Bulletin. In the September round of testing, GFI MailEssentials had a spam catch rate of more than 99% and 0 False Positives.

Continue reading

How much do you trust technology?

Machines are analyzing the data and making many of the decisions that used to be the province of human beings. In some cases, this has had very positive results; in others, not so much.

Continue reading

October Advance Notification: Time for nine

We have a medium-sized slate of patches: nine in all, three of which have been given a severity rating of critical; all of those are remote code execution issues – as are the vast majority of critical patches. One is rated moderate, and the remaining five are classified as important.

Continue reading

20 things that could happen when there’s no web monitoring software

Using 20 GIFs, we take a look at some of the ‘bad’ things that could happen if you’re not paying close attention to how your Internet is being used in the workplace.

Continue reading

Block harmful websites or else…

When Internet access is completely unrestricted, bad things can happen with alarming frequency. Companies’ IT or security teams need to implement technical protections to block harmful websites, or employees can quickly find their workstations compromised by malware.

Continue reading

Survey: Spam email disrupts two-thirds of businesses each year [Infographic]

58% of US organizations surveyed were affected by an employee clicking on a malicious email. More findings form a recent survey by GFI Software into spam email in the workplace here!

Continue reading

Improving productivity with Internet monitoring software

In an ideal world you’d like to find an easy way to manage and monitor access to the Internet so that you are efficiently using bandwidth, maintaining productivity and keeping employees happy. It’s possible with Internet monitoring software. In this post we explain how.

Continue reading

The top 24 facepalm moments in information security

With all the media attention focused on ShellShock, we thought it would be a good time to take a look back at some other web-shaking security events of the past. In chronological order, here are 24 facepalm moments in information security.

Continue reading

To split or not to split? That is the question

Whenever a company wants to set up a VPN for its remote users, one of the major decision points that always comes up is whether or not to support split tunneling. In this post we define split tunneling and some related terms.

Continue reading