Latest posts

Page 61

57 Tips Every Admin Should Know

The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time and help you solve problems. Assume that all of these Windows commands should be run […]

Continue reading

5 Ways Employees Steal Data

Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons to steal your data. They might be planning to move to a competitor or begin […]

Continue reading

What Should Your Email Storage Software Include?

With billions of emails exchanged daily, it is no wonder that email makes such a significant portion of how organizations communicate. With so much valuable information stored in email, organizations turn to email storage software to manage and retrieve it. However, email storage software doesn’t just help with the storage of emails; a good email […]

Continue reading

5 Tips to Ensure Corporate Email Compliance

A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations – the SOX, HIPAA, GLB and others. In this post I offer five tips that you can use to avoid all of the […]

Continue reading

Walking the Fine Line between Network Monitoring and Freedom

We have embraced social networking sites so much that they have become a part of our everyday life. For most of us, checking our Twitter account, reading emails and following our friends’ updates on Facebook have become a daily routine. There are very few situations when we cannot go online to check Facebook, Twitter, or […]

Continue reading

GFI ATG at Black Hat USA 2011

Hackers, researchers and industry professionals alike converged on Caesars Palace, Las Vegas, to address the biggest security concerns of today (and tomorrow) at Black Hat USA 2011. And of course, the GFI Advanced Technology Group (ATG) was there, demonstrating the latest in cutting-edge security solutions. “Hacker mania” is how Omar Aldahir, ATG lead security analyst, […]

Continue reading

Managing Email Storage Before it Becomes a Problem

If you have a small business you’re probably running a server with Small Business Server (SBS) for email, file sharing and collaboration. SBS is a good fit for small businesses as it provides a good platform for the IT of a small organization. When the server is new, performance is great, email and file sharing […]

Continue reading

The Perils of Public Wireless Networks

The widespread availability and convenience of public wireless networks allows us to be online as much as possible. Wi-Fi hotspots can be found almost anywhere – in airports, in restaurants, in coffee shops, bars – unless you’re in the middle of nowhere with not a soul in sight. While wireless public networks allow us to […]

Continue reading

Hacking Motivations – Hacktivism

Hacktivism is a term which describes the use of hacking for political, non-violent activism. As with any other form of activism, people’s perceptions will differ; some see hacktivism as a necessary tool against oppression, while others see it as nothing more than cyber-terrorism. It is important to note that Hacktivism is not something new. In […]

Continue reading

Privacy? What Privacy?

Every so often we are regaled with attention-grabbing headlines announcing the demise of the individual’s right to privacy or how Big Brother has a constant roving eye over us all, recording the minutiae of our very existence. We grumble because we are fingerprinted at airports and we complain because our local High Street has more […]

Continue reading