Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons …
With billions of emails exchanged daily, it is no wonder that email makes such a significant portion of how organizations communicate. With so much valuable information stored in email, organizations turn to email storage software to manage and retrieve it. …
A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations – the SOX, HIPAA, GLB and others. In …
We have embraced social networking sites so much that they have become a part of our everyday life. For most of us, checking our Twitter account, reading emails and following our friends’ updates on Facebook have become a daily routine. …
Hackers, researchers and industry professionals alike converged on Caesars Palace, Las Vegas, to address the biggest security concerns of today (and tomorrow) at Black Hat USA 2011. And of course, the GFI Advanced Technology Group (ATG) was there, demonstrating the …
If you have a small business you’re probably running a server with Small Business Server (SBS) for email, file sharing and collaboration. SBS is a good fit for small businesses as it provides a good platform for the IT of …
The widespread availability and convenience of public wireless networks allows us to be online as much as possible. Wi-Fi hotspots can be found almost anywhere – in airports, in restaurants, in coffee shops, bars – unless you’re in the middle …
Hacktivism is a term which describes the use of hacking for political, non-violent activism. As with any other form of activism, people’s perceptions will differ; some see hacktivism as a necessary tool against oppression, while others see it as nothing …
Every so often we are regaled with attention-grabbing headlines announcing the demise of the individual’s right to privacy or how Big Brother has a constant roving eye over us all, recording the minutiae of our very existence. We grumble because …
The decision to start blocking websites is not one to be made lightly, but it is one all companies face eventually. Users with unrestricted Internet access find themselves constantly battling malware infections and at risk of information leakage, while companies …