Latest posts

Page 60

You’ve got All Your Security Technologies in Place… Now What?

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to enforce an organization’s network security but the journey shouldn’t stop there. You can only achieve […]

Continue reading

The Hidden Threats Behind Web Banners

What is ‘malvertising’ and why is it dangerous? Watch this video to learn more about the perils posed by malicious web banners and what you can do to protect your network and your users against their harmful payload.

Continue reading

April Webcast Line-Up

Here at GFI we try to share all the information you need on the latest technologies. This month, we’re offering all the following FREE webinars – have a look and see what best suits your needs!

Continue reading

Is Your Deception Defense Strong?

April Fools is a whole day dedicated to the art of deception. Newspapers run spoof stories, pranks are pulled and the world generally does its best to tickle its collective funny bone. For that one day, that brief 24 hours, lies and deception become funny. That is, unless those lies and deception involve social engineering. […]

Continue reading

Integrating Exchange Server in a Non-Windows Environment

Using Exchange Server in a non-Windows enterprise environment can be a tricky, yet unavoidable situation for some organizations.  In this post I will highlight some of the best methods you can apply to integrate Exchange Server in a non-Windows environment.

Continue reading

Why Do Companies Fax?

In all my years of involvement with the fax server software industry, telephone systems, a plethora of industry sectors, and small to enterprise business in general, I cannot remember one person ever telling me they love to fax. So why do companies fax?  It’s not because they want to, but more because they have to.  […]

Continue reading

How to Dispose of Confidential Data

Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked – the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video.

Continue reading

Exchange Server 2010 Scalability Techniques

As your organization grows, so do mailboxes and, with them, storage requirements. You will therefore need to make some scalability tweaks and design considerations in accordance with this growth. In this post I shall outline the best Exchange Server 2010 scalability methods any Exchange admin should consider.

Continue reading

Danish Police Incident Calls for a Security Assessment

A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not even be familiar with Security practices. These situations can cause a lot of problems and […]

Continue reading

10 Free Tools for Network Administrators

Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video’s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size business) administrator!

Continue reading