Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

The Art of Social Engineering

on September 19, 2011

Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a …

4

Implementing a Fax Server in a VoIP Environment

on September 15, 2011

Voice over IP (VoIP) is becoming an increasingly popular means to deploy the phone infrastructure within the SMB space.  However, the move to VoIP presents the challenge of interfacing the new VoIP system with the ability to send and receive …

7

Understanding Website Categorization in GFI WebMonitor

on September 5, 2011

GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand …

5

What You Should Know About Exchange Email Backup

on September 1, 2011

Backing up email is a crucial task, and is necessary to safeguard the valuable information stored in email. Yet how many organisations take a critical look at how and why they backup email? For organisations that want to run an …

4

57 Tips Every Admin Should Know

on August 24, 2011

The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time …

9

5 Ways Employees Steal Data

on August 22, 2011

Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons …

5

What Should Your Email Storage Software Include?

on August 17, 2011

With billions of emails exchanged daily, it is no wonder that email makes such a significant portion of how organizations communicate. With so much valuable information stored in email, organizations turn to email storage software to manage and retrieve it. …

5

5 Tips to Ensure Corporate Email Compliance

on August 16, 2011

A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations – the SOX, HIPAA, GLB and others. In …

5

Walking the Fine Line between Network Monitoring and Freedom

on August 12, 2011

We have embraced social networking sites so much that they have become a part of our everyday life. For most of us, checking our Twitter account, reading emails and following our friends’ updates on Facebook have become a daily routine. …

6

GFI ATG at Black Hat USA 2011

on August 11, 2011

Hackers, researchers and industry professionals alike converged on Caesars Palace, Las Vegas, to address the biggest security concerns of today (and tomorrow) at Black Hat USA 2011. And of course, the GFI Advanced Technology Group (ATG) was there, demonstrating the …

0