Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched …
Competition is now closed We’re jumping on the Cyber Monday bandwagon by having a mini competition which is just fun! There are 100 GFI WebMonitor inflatable truncheons to be won and out of the 100 winners, one of you will …
“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …
In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are …
Email has become a key form of communication for businesses worldwide. Every day, billions of emails are sent and received and the ever-increasing volume of email is becoming a concern for systems administrators in every type of enterprise. Storage issues, …
Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …
Great news for GFI! GFI has won the Software Vendor of the Year award from the UK channel publication CRN. Despite some tough competition from vendors such as Microsoft, Orcale, IBM UK, Citrix and Avaya, GFI’s submission was considered by …
Picture a scenario of a network on 1000 hosts. On performing a network audit, it is found that 10 machines (servers and workstations) are un-patched. Although this might not seem like a large percentage (1%), one must keep in mind …
One important tool in security is without a doubt an effective security policy. A security policy helps to ensure that common procedures across the organization are followed thus facilitating the identification of risks and mitigation of said risks as well …
New version is the first solution to automate patching for all major Web browsers running on Windows systems We’re pleased to announce the release of GFI LANguard™ version 9.6, the first network security solution to automate missing patch detection and …