Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

What’s New in GFI WebMonitor®

on June 18, 2013

David Attard, Product Manager for GFI WebMonitor, talks about what’s new in GFI WebMonitor 2013.

0

Learn to Harness the Speed and Security of the Cloud! [Webcast]

on June 14, 2013

It’s time to forget everything you know about backup because the backup game has changed. This webcast will introduce you to the exciting new product from GFI MAX and the next big thing in Backup! Register now to learn how …

0

Top 20 Free Disk Tools for SysAdmins

on June 12, 2013

Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some …

2

Why Cloud-based IT Management Is “It” for IT

on June 7, 2013

The big trend in IT from the do-it-yourself business owner to the enterprise is cloud-based IT management. It’s not just because “the cloud” is the big buzzword and no one wants to be left behind. It’s because cloud-based IT management …

1

Networks without Borders: The New Security Paradigm

on June 5, 2013

In ancient times, cities were often walled fortresses, with heavily guarded perimeters, and strangers were closely scrutinized before being allowed to pass through the gates. Likewise, in the “old days” of computer networking, there were strict lines of demarcation between …

0

June Webcast Line-Up

on June 3, 2013

Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!

0

How to Protect Your Twitter Account from Targeted Phishing Attacks

on May 31, 2013

The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, …

0

The Hidden Security Threat

on May 29, 2013

Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my …

0

The Technology Trap: How Your Business Can Break out and Step Up

on May 27, 2013

Many small to mid-sized companies have become more and more trapped and hamstrung by the need to manage IT. Business leaders spend only one hour per month on strategy while their businesses are also at the mercy of increasingly stressed …

0

TMI/NEK: Too Much Information, Not Enough Knowledge

on May 24, 2013

“Knowledge is power” – scientia potential est in Latin – is an aphorism commonly attributed to Sir Francis Bacon. It’s true, but what we sometimes forget is that information (much less raw data) does not equal knowledge. Data consists of …

0