Latest posts

Page 5

Security 101 – Encryption terminology

One of the first things that comes to mind when talking about security is encryption. Encryption can be used to provide confidentiality and integrity, which are two of the three main tenets behind security. To be sure that you are familiar with the concepts we will be covering in upcoming articles, here is a primer on encryption terminology.

Continue reading

IT Confidential: A Day in the Life

As cloud computing slowly but persistently permeates all of IT, what will a day in the life of the IT pro of tomorrow be like?

Continue reading

Happy Halloween from the GFI team!

As in previous years, our colleagues in various offices let their creativity and imagination go wild and they came up with some really cool and scary costumes for Halloween.

Continue reading

Trick or treat – the 21 scariest things on your network

With Halloween just around the corner, are you prepared for tricks, or hoping only for treats. There’s an entire host of evil out there. How many of these ghastly things might be found on your network?

Continue reading

Controlling Internet access at the application layer

You want to permit your users to access the web and all the good it has to offer, but you need to protect your users, your business, and your customers from all the bad. What do you do?

Continue reading

Third party patch and vulnerability roundup: October 2014

Here we go again – another end-of-month has rolled around and it’s time to check out the security updates, other than those issued by Microsoft on Patch Tuesday, that have hit the streets since last we met here.

Continue reading

It’s Fiesta time! (And that’s not a good thing)

If you’ve neglected to apply the October patches released by Adobe for their Flash Player, attackers might be partying down with your computers.

Continue reading

How to troubleshoot Exchange ActiveSync connections

Ensuring that Exchange ActiveSync is working properly on both your Exchange infrastructure and your users’ myriad mobile devices is one of the most important things you can do. Usually, EAS works perfectly well, so this is not a problem for you. But occasionally, things do fail, so knowing what to look at and how to troubleshoot are critical skills. This article should help get you started.

Continue reading

Clever phishing attack uses Dropbox to spoof Dropbox

Dropbox recently detected and shut down a spoofing page designed to grab users’ credentials to Dropbox and other webmail based systems that was hosted on Dropbox itself.

Continue reading

Play ball! But make sure critical apps don’t strike out

As users go looking for the plays of the day, interviews with the players, and perhaps even the odds for the next game, you need to make sure that their enthusiasm for the game doesn’t cause productivity issues, or worse, prevents critical business apps from functioning.

Continue reading