Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

Research: Web Browser War, Security Battle in 2011

on March 5, 2012

No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, …

6

Survey: UK Lags US in Using the Cloud to Combat Spam [INFOGRAPHIC]

on March 1, 2012

Spam may not be the headline-grabbing topic it once was, but as our research friends in the GFI Labs continue to point out, spam and phishing attacks are still a preferred tactic of cybercriminals. To get a better sense of …

6

The Most Vulnerable Operating Systems and Applications in 2011

on February 27, 2012

As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I …

4

The Ultimate Network Security Checklist

on February 24, 2012

Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and …

11

How to Protect Your Network against DDoS Attacks

on February 21, 2012

The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism,  DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …

5

ACTA and the Anti Circumvention Clause

on February 16, 2012

This citation concerns you: “Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with exercise of their rights in …

7

5 Ways Valentine’s Day can Cost Your Business

on February 13, 2012

Most businesses look forward to Valentine’s Day as the next big-bucks occasion following the holiday period. People are still reeling from their holiday spends in January, but come mid-February they are ready to pull out the plastic again to spend …

6

VIPRE® Antivirus Business Product Demo and Webcast

on February 10, 2012

Hundreds of thousands worldwide rely on VIPRE Antivirus Business to protect their networks against malware. And just by switching to VIPRE, IT admins in healthcare, education, finance and other industries have made their jobs easier and their organizations safer with …

4

7 Reasons to Consider Cloud Anti-Spam

on February 8, 2012

Why should you consider cloud anti-spam? Spam is a headache for both users and administrators. You know the drill – the company invests in good anti-spam and anti-phishing software hoping to put an end to the unsolicited mail headache. But …

5

15 Great Security Blogs to Check Out!

on February 6, 2012

One of the topics we’re passionate about here at TalkTechToMe is security, and there’s no better way to keep up-to-date and aware of all that is going on than by checking in regularly with our favourite security blogs. We’ve compiled …

9