Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

How to limit Internet access on the network

on July 8, 2011

There are several reasons why you need to limit Internet access on the network. Perhaps your company is experiencing a problem with individuals’ productivity. Or Human Resources has determined that there is an issue with certain employees’ web access. Maybe …

5

When security threats are closer to home – literally

on July 7, 2011

I had an interesting discussion with a couple of colleagues on the value of consumer security research to the business community. They argued that a business is not really interested in what home users do and, moreover, the security risks …

4

Trade Secrets and Intellectual Property

on July 5, 2011

There are different objectives behind malware and hacking attacks, and one of the primary reasons is obviously financial gain. The methods malicious hackers use to achieve financial gain have over time changed and evolved. In the past, this activity centered …

6

Why do you need effective web content filtering?

on July 4, 2011

In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This …

4

SPAM e-Mails: Bringing You Excitement Since 1978

on July 1, 2011

Spam is a pain to deal with. It clogs up your mailbox, brings down mail servers, and can harbor viruses and malware. As much of a hassle spam is to deal with, at least it brings the promise of excitement …

4

The Insidious Insider Threat!

on June 30, 2011

In security we often preach that insider threats are generally the worst. When the attacker is one of your own the challenge to keep your systems safe becomes a lot harder. This is because you effectively tell your staff what …

6

101 FREE system admin tools!

on June 27, 2011

Who doesn’t love tools that make life easier? We have created a free guide offering a list with 101 free system admin tools! How can you get hold of this? Simply Like our Facebook page and it’s all yours to …

8

4 Reasons to monitor Internet usage within your organization

on June 23, 2011

If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take …

5

What are Teenagers Really Doing Online?

on June 16, 2011

A scientific study of home Internet use by parents and their teenage children to better understand how they behave online, has been released by GFI. Designed and implemented by a noted polling expert, the nationally-representative 2011 Parent-Teen Internet Safety Report identifies …

5

GFI Attends Microsoft TechEd 2011

on June 16, 2011

The ever-popular Microsoft TechEd 2011 was held last month from May 16, 2011 – May 19, 2011 in Atlanta, GA, USA. The event was very well attended and GFI were also present in booth #1915 with the theme ‘Fast and …

0