Latest posts

Page 58

PCI DSS: Twelve IT requirements

The Payment Card Industry Data Security Standards — or PCI DSS — cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS’s 12 key requirements in this quick overview; together they make up the kind of IT security policy that any company would be wise to implement.

Continue reading

111 Windows Tips to Help You Put Nine Hours into an Eight-Hour Day

Is this you: Eat lunch at your desk because you don’t have time to go out? Can’t stop for five minutes to chat at the coffee machine? Wear your wireless headset into the restroom because conference calls and biological necessities conflict? Tired of always leaving work just five minutes too late to beat the afternoon […]

Continue reading

Take back Control of Your Bandwidth

It is a well known fact that IT Administrators are one of the least recognized and appreciated roles in a company. It is certainly true that people are quick to whine and fret when something is not working, but nobody calls to say “thanks” when everything is running smooth. One of the most common complaints […]

Continue reading

When You Become the Enemy

Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, however, are aware of this practise and counter it by hacking legitimate sites and turning […]

Continue reading

GFI Charity Fund Participates in another Rotary Hands-On Day

  Once again, the GFI Charity Fund happily joined forces with Rotary Club Malta on its fourth edition of the Rotary Hands-On Day, held on May 12, at Dar Qalb ta’ Ġesù, a shelter for victims of domestic violence, in Santa Venera (Malta). The event was organized to give the shelter a boost – improving […]

Continue reading

GFI MAX Product Line Voted “Product of the Year”

We’re pleased to announce that the GFI MAX product line was voted “Product of the Year” at the 2012 Network Group Gala and Awards. The award was accepted on behalf of GFI by Keri Fullwood. “We’re very grateful to the Group for this award and we look forward to continuing to work closely with the […]

Continue reading

Tell Us What You Think About Faxing and Enter Our Draw!

We continuously develop technology in our products to meet our clients’ needs in the best way possible. Listening to our clients and understanding what they need is very important to us and to this end we have created a short survey on faxing. Take a few minutes to tell us what you think about faxing […]

Continue reading

Is Your Network Being Sniffed? [VIDEO]

Is your network data safe? Do you know if your network traffic is being tracked and recorded by malicious third parties? Most importantly, how would you know if your network is infected and what can you do to prevent it?

Continue reading

HIPAA – IT compliance

HIPAA is the Health Insurance Portability and Accountability Act that regulates the creation and handling of personal healthcare information. If you create or handle personal healthcare information, that is data that can be tracked back to an individual, then you are very likely to be covered by the act. Here’s a quick look at HIPAA’s […]

Continue reading

10 Steps to Gain Effective Web Security

Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat by itself – besides all the other challenges that an IT administrator for a SMB […]

Continue reading