You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
Are you seeking an exciting career in IT? Do you wish to upgrade your current IT role? If you live in Malta then you want to head down to GFI’s Career Day happening on Saturday, April 16, 2011. GFI will …
Survey: More Than 60% of U.S. Small Businesses in Danger of Losing Critical Emails 62.4% of SMEs do not currently use a mail archiving solution – opening the door to a host of issues including: limited email backup and restore, …
Normally, I write GFI MAX’s bi-monthly survey and at the same time pick a worthy and topical fund (from your suggestions) to make a $500 donation to. I really like the fact that money is being donated to a worthy …
Once upon a time, way back in 2006, just before Microsoft were about to release Windows Vista. If I remember correctly this program was codenamed EVO – Exchange, Vista & Office, and MS were spending tons of money on hype …
Since Twitter turns 5 today, we thought we’d give YOU a present! Or at least the chance to win one. And we’ve made it super simple! All you have to do is follow us on Twitter and tweet this phrase: …
Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …
While the return on investment (ROI) can be quite clear cut in certain cases, such as in business sales where statistics can demonstrate whether there was an increase or not, there can be cases where a system is helping increase …
After being involved in security for a while it’s natural to see certain threats without even thinking about it. Sometimes you wonder whether you’re being paranoid or if you’re being pessimistic but then something happens and you realise that maybe …
When it comes to monitoring employee internet usage, employees are usually quite hostile to the idea even though it is in their best interest as much as it is for the business. Employee internet monitoring is generally seen as a …
In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …