Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
The annual partner event was held on Tuesday, April 12, with almost 200 Czech and Slovak partners attending. Also present for the event were GFI members, namely Simon Azzopardi (VP, APAC Sales), Paul Eldridge (Director of Channel Marketing EMEA & …
Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …
Arguably, spam forms part of the email marketing tool used by marketers for direct advertising. We never asked for or subscribed to most marketing messages that we receive on a daily basis. So how is spam different? Let’s first take …
The following GFI Software solutions, GFI VIPRE® Antivirus, GFI LANguard™, GFI EventsManager™ and GFI EndPointSecurity™, are now available for resale by VARs and MSPs through the Intel® Hybrid Cloud. SMBs are increasingly aware of the cost savings and efficiencies they …
One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …
There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for …
If one were to ask people, ‘What is the most annoying thing they experience on the internet?’ it’s safe to assume that most will name spam as their No. 1 annoyance. The main driver for spam is obviously money. People …
I have often written about episodes where security fails, even in cases when it should not have, had basic good practices been followed. So one might ask, ‘why don’t we hear about many success stories?’ A reason for that is …
Recently I came across two different stories that made me wonder why companies fail to take security seriously until after they fall victims to attacks. The first story, as reported by The Register, reports system failure as being the number …
Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …