Latest posts

Page 58

Growing Your IT Support Business by Becoming a Managed Service Provider

If you are reading this, chances are you’re the owner of a small to medium sized business (SMB) quickly reaching the limits of what you can do with your current break/fix model and you are keen to know where you can go from here. That or you’re more than happy with your break/fix business and […]

Continue reading

Why Cloud-based IT Management Makes Sense

It seems that cloud computing is making inroads into almost every service offering available to IT. There’s Software as a Service, Platforms as a Service, Infrastructure as a Service – how about Service as a Service? That last one might be a bit of a stretch, but one of the most exciting new aaS offerings […]

Continue reading

Plugging the Bandwidth Drain

Managing your resources as effectively as possible is the key to profitability. Network bandwidth is one such resource and yet it is often squandered while employees are wasting time on the network. There are many ways to use up your bandwidth — watch our quick vid to find out more and to discover how you […]

Continue reading

Survey: Confessions of the IT Crowd [Infographic]

View the UK version of the infographic The stresses of the IT administrator continue to become a mainstay of office culture that people see as inevitability. Whether their time is spent dealing with issues that should never have occurred in the first place or explaining common knowledge to end users, IT admins often feel that […]

Continue reading

Hear! Hear! Tips from THE IT Security Experts

We all have our take on IT security, and if you’re reading this post it means you want to hear more. So do we, that’s why we have reached out to some well-known IT experts in the security blogosphere and asked them to share some invaluable tips with our readers. Let us know what you […]

Continue reading

Web Filtering to Off-Network Laptop and Notebook Devices with GFI WebMonitor® 2013

Today we launched GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go.

Continue reading

Removable Storage: A Convenient Truth

Removable storage devices offer a big convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card or drive also makes it easy for employees (or anyone else who can gain physical […]

Continue reading

Who’s about to go crazy this March Madness?

Is it your IT administrator who needs to sort out all of the bandwidth issues? Is it your employees who want to access work-related resources on the web and cannot because of people streaming March Madness games?

Continue reading

Is Your Email a Ticking Legal Timebomb?

A couple of months ago, I postulated here that, far from being dead, email is alive and kicking in business organizations around the world. We talked about how to secure those messages from attackers, but that’s only part of the problem inherent in managing an email system. There’s another type of outsider to whom you […]

Continue reading

Control the Harlem Shake in Your Business

The latest craze to go viral on the web is the dance song Harlem Shake, with hundreds, if not thousands of people, gathering in costume to do ‘the shake’ in every conceivable space. Harlem Shake follows hot on the heels of another Internet ‘sensation’ – Gangnam Style; a song and dance routine that racked up […]

Continue reading