You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
We don’t need studies and surveys to confirm what is evident in a growing number of business environments today: more and more employees are using their personal smartphones for work; the line between personal and office use is becoming ever …
In addition to the inbound communication that was covered in Part 1 of this two-part blog post, it is important to consider the need to send outbound communication through email to fax functionality. In a similar fashion to the ability …
With the New Year at the corner, it is time to start putting together our admin’s wish list for 2012. Anything goes for this list – new hardware or software for work, changes to procedures or offerings from vendors, geeky gadgets, …
Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate …
No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails. Yet the very real possibility of data loss coupled with general inexperience with server …
Developing a solid backup strategy is crucial for quick restoration of business operations even in the face of a total system failure. As such, an Exchange administrator would be remiss not to take the time to develop a solid backup …
ComGuard, GFI Software’s distributor in the MEA region, recently held a GFI road show in Oman and Dubai, UAE. A highlight of the event was a presentation by GFI’s Brian Azzopardi, Product Manager for GFI MailArchiver, who introduced the latest …
As organizations continue to prefer fax transmission for certain scenarios, either because of compliance requirements, or when dealing with legacy systems, it is important for them to allow their users to streamline processes by incorporating fax with email. In the …
As Internet usage is constantly growing, malicious, phishing, scamming and fraudulent sites are also evolving and making their way to any user’s network if given the chance. A recent survey commissioned by GFI Software among small and medium-sized businesses in …
Apart from the web security features we saw in Part 1, there are other great web filtering features in GFI WebMonitor™ 2011 R3. These include: 1. Additional IM support When designing the new GFI WebMonitor we’ve focused on blocking thin …