Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

GFI Software Acquires Sunbelt Software

on July 13, 2010

We have enhanced our Security Product Offering with the Acquisition of Sunbelt Software and specifically its VIPRE® product suite. The acquisition will allow us to merge VIPRE technology into our email security and web security solutions group, and will provide …

1

Twitter in the workplace: to take action or not to take action?

on July 12, 2010

Twitter has, like similar social networking sites, raised many security questions – especially when it comes to whether businesses should allow employees access in the workplace. While many businesses have adopted Twitter as part of their marketing arsenal, they would …

6

Protect Your Customers and Employees Against Data Theft and Identity Fraud

on July 8, 2010

Security breaches threaten not only your infrastructure and data integrity, but also your standing in the business community and your organization’s very survival.  The protection of personally identifiable information (PII) has become a necessity in many areas, mandated via local, …

6

10 Tips to Avoid Spam

on July 7, 2010

Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …

9

Wild Wild West (WWW)

on July 5, 2010

In the past decade the internet has surpassed all expectations and changed the lives of us all. The World Wide Web holds little or no safety for the end user. Very much like the Wild West in the 1800s, the …

3

How to create a complex and secure backup strategy

on July 1, 2010

Nobody likes to backup, but the reality is that hard drive failure or other types of disaster (natural or not) is something that we need to be prepared for at any time. What better way of being prepared for disaster …

3

Is Privacy Dead?

on June 28, 2010

With the advent of the internet many people seem to forget about privacy and its importance.  Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …

12

Who Will Win the World Cup 2010?

on June 25, 2010

As the first round of the FIFA World Cup 2010 comes to an end so does our fantastic GFI World Cup Competition. If you still haven’t submitted your vote you’ve got until the end of today (June 25) to do …

3

Do you know the dangers of wireless networks?

on June 24, 2010

I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …

7

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

13