Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+

How to confirm your systems aren’t suffering a major Heartbleed

on April 15, 2014

The Internet was rocked last week when a two-year-old bug in OpenSSL was revealed. Heartbleed, as the vulnerability is known, can result in massive information disclosure through simple requests that require no privileges, and leave no logs. Anything from command …


Why is web security indispensable for your business?

on October 13, 2010

In a recent survey conducted by GFI Software, 69.9% of small and medium-sized enterprises (SMEs) said they used web monitoring and web filtering solutions in their business. When GFI asked these SMEs why they chose to invest in the technology, …


Top 10 Reasons to use Network Monitoring Solutions

on October 12, 2010

Businesses today are faced with the tedious challenge of maintaining their network to allow for consistent availability and productivity. So here are the Top 10 reasons for using network monitoring solutions for your business. Whether you are a CEO, executive, …


Troubleshooting FOIP issues

on October 7, 2010

Although FAX over Internet Protocol (FOIP) has been around for a few years, lately there has been a steady rate of adoption of this technology. A wide choice of VOIP Gateways, significant reduction of phone bills through least cost routing …


Top 10 Malware Threats for September

on October 6, 2010

The top 10 most prevalent malware threats for the month of September were: Trojan.Win32.Generic!BT           23.54% Trojan-Spy.Win32.Zbot.gen      4.27% Trojan.Win32.Generic!SB.0       4.06% Trojan.Win32.Generic.pak!cobra 3.04% INF.Autorun (v)               …


Exceeding Expectations with GFI

on October 5, 2010

Check out our recent internal campaign where various GFI members shared their experiences about working at GFI as we strive to exceed expectations and aim to meet all our clients’ needs. Over the coming weeks we’ll be posting more quotes, …


How safe is the Internet in reality?

on October 4, 2010

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …


DNS Blacklists: What are they, how do they work and why do we need them?

on October 1, 2010

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …


How to Create a Backup – Part 1

on September 27, 2010

How to create a backup – part 1 Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data. As most people know, a backup …


Green IT! Top 10 Tips for Administrators to turn Green

on September 24, 2010

Everyone can do their bit for the environment, and reduce costs, simply by being a little bit smarter about how they use information technology. Start here with these top 10 green IT tips, presented in no particular order. Setting a …


A Look into Insidious Threats – The Logical Bomb

on September 22, 2010

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an …