Latest posts

Page 61

HIPAA – IT compliance

HIPAA is the Health Insurance Portability and Accountability Act that regulates the creation and handling of personal healthcare information. If you create or handle personal healthcare information, that is data that can be tracked back to an individual, then you are very likely to be covered by the act. Here’s a quick look at HIPAA’s […]

Continue reading

10 Steps to Gain Effective Web Security

Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat by itself – besides all the other challenges that an IT administrator for a SMB […]

Continue reading

Antivirus and Anti-Spam Protection Combined in GFI MailEssentials™ 2012

In order to help small to medium-sized businesses (SMB) in the fight against email-borne threats, we have now launched GFI MailEssentials 2012 UnifiedProtection. The solution features robust anti-spam functionality, now combined with up to five virus detection engines, including the award-winning GFI VIPRE® antivirus, to give SMBs comprehensive protection against phishing, spam and virus-carrying emails.

Continue reading

Five essential tips to ensure corporate email compliance

The world of email compliance is a complicated one. Not only do you have to cope with an alphabet soup of acronyms describing regulatory bodies, you also have to decipher reams of compliance requirements for your industry. In an effort to ease that burden, we have put together this quick guide on how to help […]

Continue reading

May Webcast Line-Up

Every month we organize some exciting FREE webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!

Continue reading

A Deeper Look at Spam and Malware Filtering with Exchange Server

There are various spam filtering tools at an Exchange admin’s disposal. How can these be used to leverage Exchange itself? What other solutions are there to defend against spam and malware? Read on.

Continue reading

The Top 5 Online Security Traps and how to Avoid Them

It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to share with your network users on five common online security traps.

Continue reading

Survey: 5 Most Ridiculous Things IT Admins Have Seen Business Users Do [INFOGRAPHIC]

If you work in an office, chances are you have seen a frantic IT guy or gal running around trying to put out virtual fires, and you’ve wondered what all the fuss was about. In addition to the numerous, legitimate, technical glitches that can come up when operating a data center, there are also lots […]

Continue reading

The Perils of Public Wireless Networks

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This video sheds more light on those risks and shares some useful tips on how to […]

Continue reading

57 Simple Sys Admin Mistakes that Someday You’ll Regret

When it comes to IT, simple mistakes can cost you big time. Whether that is immediately or not depends on a number of factors, and sometimes, when something has gone incredibly wrong, you won’t even realize that the root cause was a snap decision or simple oversight you made months ago. If you parse this […]

Continue reading