Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

5 Ways Employees Steal Data

on August 22, 2011

Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons …

5

What Should Your Email Storage Software Include?

on August 17, 2011

With billions of emails exchanged daily, it is no wonder that email makes such a significant portion of how organizations communicate. With so much valuable information stored in email, organizations turn to email storage software to manage and retrieve it. …

5

5 Tips to Ensure Corporate Email Compliance

on August 16, 2011

A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations – the SOX, HIPAA, GLB and others. In …

5

Walking the Fine Line between Network Monitoring and Freedom

on August 12, 2011

We have embraced social networking sites so much that they have become a part of our everyday life. For most of us, checking our Twitter account, reading emails and following our friends’ updates on Facebook have become a daily routine. …

6

GFI ATG at Black Hat USA 2011

on August 11, 2011

Hackers, researchers and industry professionals alike converged on Caesars Palace, Las Vegas, to address the biggest security concerns of today (and tomorrow) at Black Hat USA 2011. And of course, the GFI Advanced Technology Group (ATG) was there, demonstrating the …

0

Managing Email Storage Before it Becomes a Problem

on August 10, 2011

If you have a small business you’re probably running a server with Small Business Server (SBS) for email, file sharing and collaboration. SBS is a good fit for small businesses as it provides a good platform for the IT of …

5

The Perils of Public Wireless Networks

on August 9, 2011

The widespread availability and convenience of public wireless networks allows us to be online as much as possible. Wi-Fi hotspots can be found almost anywhere – in airports, in restaurants, in coffee shops, bars – unless you’re in the middle …

4

Hacking Motivations – Hacktivism

on August 4, 2011

Hacktivism is a term which describes the use of hacking for political, non-violent activism. As with any other form of activism, people’s perceptions will differ; some see hacktivism as a necessary tool against oppression, while others see it as nothing …

6

Privacy? What Privacy?

on August 1, 2011

Every so often we are regaled with attention-grabbing headlines announcing the demise of the individual’s right to privacy or how Big Brother has a constant roving eye over us all, recording the minutiae of our very existence. We grumble because …

8

Blocking websites doesn’t have to be a bad thing

on July 26, 2011

The decision to start blocking websites is not one to be made lightly, but it is one all companies face eventually. Users with unrestricted Internet access find themselves constantly battling malware infections and at risk of information leakage, while companies …

6