Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

Why the Need for Internet Monitoring?

on April 11, 2011

There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for …

4

Explaining Botnets

on April 7, 2011

If one were to ask people, ‘What is the most annoying thing they experience on the internet?’ it’s safe to assume that most will name spam as their No. 1 annoyance. The main driver for spam is obviously money. People …

5

How Internet Monitoring can Save your Organization

on April 6, 2011

I have often written about episodes where security fails, even in cases when it should not have, had basic good practices been followed. So one might ask, ‘why don’t we hear about many success stories?’ A reason for that is …

1

Why Prevention is Better than Cure when it comes to IT Security

on April 5, 2011

Recently I came across two different stories that made me wonder why companies fail to take security seriously until after they fall victims to attacks. The first story, as reported by The Register, reports system failure as being the number …

3

How End Point Security Software Can Prevent Data Theft

on April 4, 2011

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …

3

Internet Monitoring: both sides of the table (Part 2)

on April 1, 2011

In the first part of this article we saw the legal parameters within which organizations implement internet monitoring. It’s easy to understand why employees feel concerned about being monitored at work. After all it’s human nature to feel uneasy knowing …

2

The Importance of Using Multiple Passwords

on March 31, 2011

One of the most hated security policies is that of asking users to have different passwords for each different service they make use of. Many see this as unnecessary because they reason that if their chosen password is strong enough …

3

Internet Monitoring: both sides of the table (Part 1)

on March 30, 2011

The debate about internet monitoring in the workplace has been going on for years! Employees often feel their employers are yet another entity that is enforcing the big brother effect on them, yet on the flip side employers feel as …

2

How can Internet Monitoring help your Organization?

on March 29, 2011

The topic of internet monitoring is known to raise a few eyebrows, but if you think about this from an administration level, it’s easier to appreciate.  What do I mean by this?  In short, internet monitoring will help to cut …

1

Top 3 Patch Management Do’s and Don’ts

on March 28, 2011

A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …

4