You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
On April 1, 69 cars lined up at the start line of the amazing Autodromo di Pergusa racing track in Sicily. Beautifully positioned around the lake, the five kilometer circuit is one of the fastest tracks in Italy and has …
In its latest “Magic Quadrant for Secure Web Gateway Report”, Gartner has reported that Microsoft had advised that it will no longer be shipping TMG – but only “sustaining” it for the time being until its declared end-of-life. Deb Shinder …
Most employees require full Internet connectivity in order to work productively. Opening the Internet to employees can come at a large cost however – if Internet usage is not monitored, employees can make bad use of it to the detriment …
I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our …
This is why the GFI world was turning blue a few weeks ago! We are thrilled to announce the launch of our new corporate image. Our Facebook, Twitter and YouTube pages have also been revamped as part of our image …
Patching systems is often seen as a simple task but there is more to the patch management process than meets the eye. You don’t just get the patches and deploy them but you need to start planning and testing before …
Most organizations pay attention to security and patching their systems, but how many have a well-honed patch management policy? Patch management is often seen as a trivial task. Simply click on ‘update’ and that’s it. But in reality there is …
Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware …
Running a vulnerability assessment is fundamental for any organization. When an administrator is in the process of securing his network, there are a lot of things he needs to bear in mind. Unfortunately, when it comes to network security most …
Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …