You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a …
Voice over IP (VoIP) is becoming an increasingly popular means to deploy the phone infrastructure within the SMB space. However, the move to VoIP presents the challenge of interfacing the new VoIP system with the ability to send and receive …
GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand …
Backing up email is a crucial task, and is necessary to safeguard the valuable information stored in email. Yet how many organisations take a critical look at how and why they backup email? For organisations that want to run an …
The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time …
Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons …
With billions of emails exchanged daily, it is no wonder that email makes such a significant portion of how organizations communicate. With so much valuable information stored in email, organizations turn to email storage software to manage and retrieve it. …
A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations – the SOX, HIPAA, GLB and others. In …
We have embraced social networking sites so much that they have become a part of our everyday life. For most of us, checking our Twitter account, reading emails and following our friends’ updates on Facebook have become a daily routine. …
Hackers, researchers and industry professionals alike converged on Caesars Palace, Las Vegas, to address the biggest security concerns of today (and tomorrow) at Black Hat USA 2011. And of course, the GFI Advanced Technology Group (ATG) was there, demonstrating the …