Latest posts

Page 60

Love Your AV – Introducing VIPRE 5.0

Today GFI Software released GFI VIPRE® Antivirus Business 5.0, the latest version of its anti-malware endpoint security solution. Version 5.0 offers the same award-winning protection that businesses love, but is easier to install, deploy and manage with these new features: Enhanced management console Allows admins to accomplish tasks easily—all in one place—via a centralized and […]

Continue reading

Network Internet Control – Managing Risk the Right Way

The first thing that comes to mind when discussing network Internet control is usually how the administrator can make sure that users are visiting legitimate websites. Secondly, most administrators would be running regular virus scans of any file(s) downloaded from websites to ensure that none of these is infected with malware. Both approaches to network […]

Continue reading

Microsoft Action Ends the Kelihos Botnet

In another victory against spammers, Microsoft’s Digital Crimes Unit (DCU) has taken down the Kelihos botnet, which at the time the command and control servers were knocked offline, controlled some 41,000 infected hosts and was able to send 3.8 billion spam emails every day. Yesterday, Microsoft released the details of its actions against the alleged […]

Continue reading

Taking the Right Measures to Improve Exchange Performance

With most small and medium-sized businesses (SMBs) depending on Microsoft Exchange as the core of their messaging infrastructure, Exchange performance is critical to the Exchange admin. Whether the email is down, or merely slow, admins will need to take care of the help desk calls. However, it doesn’t have to be like this; with the […]

Continue reading

The 43 Things Administrators Should Never Do

Administrators have a tough job on their hands to manage, maintain and protect the network they are responsible for. Armed with the latest tools, they do an excellent job; however, at times, often due to pressure, they make mistakes – sometimes easily avoidable. In this post we are going to present the top 43 common […]

Continue reading

Defending Against Zero-Day Threats

Zero-day threats are attacks that use an unknown exploit/attack for which no patch or antivirus definition file exists as yet, and they are a major concern for administrators.  So what can an administrator do to prevent zero-day attacks from affecting systems under his/her control? There is no method of detection for zero-day exploits that is […]

Continue reading

The Art of Social Engineering

Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a link within the email. The following day, we received another email with details of the […]

Continue reading

Implementing a Fax Server in a VoIP Environment

Voice over IP (VoIP) is becoming an increasingly popular means to deploy the phone infrastructure within the SMB space.  However, the move to VoIP presents the challenge of interfacing the new VoIP system with the ability to send and receive faxes.  The advent of Fax over IP (FoIP) technology has allowed organizations to bridge this […]

Continue reading

Understanding Website Categorization in GFI WebMonitor

GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand what these categories mean, how they are used and which ones we should choose and […]

Continue reading

What You Should Know About Exchange Email Backup

Backing up email is a crucial task, and is necessary to safeguard the valuable information stored in email. Yet how many organisations take a critical look at how and why they backup email? For organisations that want to run an Exchange email backup, this task can be challenging, but also vital for disaster recovery and […]

Continue reading