Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, …
Once again, the GFI Charity Fund happily joined forces with Rotary Club Malta on its fourth edition of the Rotary Hands-On Day, held on May 12, at Dar Qalb ta’ Ġesù, a shelter for victims of domestic violence, in …
We’re pleased to announce that the GFI MAX product line was voted “Product of the Year” at the 2012 Network Group Gala and Awards. The award was accepted on behalf of GFI by Keri Fullwood. “We’re very grateful to the …
We continuously develop technology in our products to meet our clients’ needs in the best way possible. Listening to our clients and understanding what they need is very important to us and to this end we have created a short …
Is your network data safe? Do you know if your network traffic is being tracked and recorded by malicious third parties? Most importantly, how would you know if your network is infected and what can you do to prevent it?
Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat …
In order to help small to medium-sized businesses (SMB) in the fight against email-borne threats, we have now launched GFI MailEssentials 2012 UnifiedProtection. The solution features robust anti-spam functionality, now combined with up to five virus detection engines, including the …
Every month we organize some exciting FREE webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!
There are various spam filtering tools at an Exchange admin’s disposal. How can these be used to leverage Exchange itself? What other solutions are there to defend against spam and malware? Read on.
If you work in an office, chances are you have seen a frantic IT guy or gal running around trying to put out virtual fires, and you’ve wondered what all the fuss was about. In addition to the numerous, legitimate, …