Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

March Webinar: Add Value to Your MSP with Cloud Services

on March 20, 2012

Coming to “the end” of your time as a Managed Services Provider (MSP)? Looking for a way to “break on through” your business doldrums by adding cloud services? Then register for this month’s informative webinar and learn a bit more …

4

Scanning Open Ports in Windows: A Quick Guide

on March 15, 2012

When troubleshooting client or server side application network connectivity issues, it is often necessary to determine if access to a certain port that the application uses is being blocked. In this article we’ll take a quick look at how to …

5

Security Patching Trends for Major Software Vendors

on March 13, 2012

An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch …

3

Survey: Americans OK with Web Monitoring at Work

on March 8, 2012

GFI Software recently conducted a survey of 620 US workers, and a significant majority of them do not consider employers’ use of web monitoring software an invasion of privacy. Survey respondents split almost evenly about whether or not their employer …

5

GFI WebMonitor™ 2012 Released!

on March 8, 2012

GFI WebMonitor 2012, one of the industry’s leading web security solutions for small and medium-sized businesses (SMBs), has been released today. Last fall, the company introduced several innovations to enable SMBs to better defend their networks, including a website safeness rating, stronger blocking …

4

Research: Web Browser War, Security Battle in 2011

on March 5, 2012

No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, …

6

Survey: UK Lags US in Using the Cloud to Combat Spam [INFOGRAPHIC]

on March 1, 2012

Spam may not be the headline-grabbing topic it once was, but as our research friends in the GFI Labs continue to point out, spam and phishing attacks are still a preferred tactic of cybercriminals. To get a better sense of …

6

The Most Vulnerable Operating Systems and Applications in 2011

on February 27, 2012

As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I …

4

The Ultimate Network Security Checklist

on February 24, 2012

Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and …

11

How to Protect Your Network against DDoS Attacks

on February 21, 2012

The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism,  DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …

5