Latest posts

Page 61

4 Web Security Threats to Look Out For

Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate sites. The end-user remains the weakest link in web security as malware authors exploit this […]

Continue reading

4 Steps to Recovering a Failed Exchange Server

No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails.  Yet the very real possibility of data loss coupled with general inexperience with server restoration – it’s not something that happens all the time, after all – makes it […]

Continue reading

4 Steps to Developing a Solid Backup Strategy for Exchange

Developing a solid backup strategy is crucial for quick restoration of business operations even in the face of a total system failure.  As such, an Exchange administrator would be remiss not to take the time to develop a solid backup plan for their Exchange Server deployment.  Unfortunately, putting together a solid backup strategy for an […]

Continue reading

GFI Road Show in Oman and Dubai

ComGuard, GFI Software’s distributor in the MEA region, recently held a GFI road show in Oman and Dubai, UAE. A highlight of the event was a presentation by GFI’s Brian Azzopardi, Product Manager for GFI MailArchiver, who introduced the latest release of GFI MailArchiver 2011 with its exciting new business intelligence module, MailInsights. MailInsights was […]

Continue reading

Why Organizations Are Moving Fax to Email (Part 1)

As organizations continue to prefer fax transmission for certain scenarios, either because of compliance requirements, or when dealing with legacy systems, it is important for them to allow their users to streamline processes by incorporating fax with email.  In the first of this two-part blog post, we will take a look at the ever increasing […]

Continue reading

Survey: Don’t Need Internet Monitoring Software? Think Again! [INFOGRAPHIC]

As Internet usage is constantly growing, malicious, phishing, scamming and fraudulent sites are also evolving and making their way to any user’s network if given the chance. A recent survey commissioned by GFI Software among small and medium-sized businesses in the US found that 40% of them suffered some sort of security breach as a […]

Continue reading

One Product – Multiple Protection – Total Peace of Mind (Part 2)

Apart from the web security features we saw in Part 1, there are other great web filtering features in GFI WebMonitor™ 2011 R3. These include:  1. Additional IM support When designing the new GFI WebMonitor we’ve focused on blocking thin IM clients – those clients which are available without having to download and install anything. […]

Continue reading

Email Monitoring: Don’t Let Your Digital Archive Gather Digital Dust

Email monitoring can reveal a treasure-trove of information about how your email system is actually being used. Not how much RAM or storage space is being used, or how many spam messages are blocked each day, but how your employees are actually using email to perform their jobs. With email monitoring, the amount of intelligence […]

Continue reading

One Product – Multiple Protection – Total Peace of Mind (Part 1)

One of the biggest concerns for IT administrators is web security and protecting the network they are responsible for. Most IT administrators do a pretty good job of protecting their networks from “the usual suspects”; however, there is one aspect which is often out of an IT administrator’s control – user browsing and surfing habits.

Continue reading

Black Friday: 5 Tips to Stay Safe this Holiday Season

Many people take the day off after Thanksgiving and seize the opportunity to run down to their favorite mall or outlets and make the most of the huge discounts on many items, knocking a few presents off the list. Those less keen on finding somewhere to park their car and wait in long queues, may […]

Continue reading