Latest posts

Page 61

Survey: Americans OK with Web Monitoring at Work

GFI Software recently conducted a survey of 620 US workers, and a significant majority of them do not consider employers’ use of web monitoring software an invasion of privacy. Survey respondents split almost evenly about whether or not their employer uses a web monitoring solution, with only about 10% unsure if such software is being […]

Continue reading

GFI WebMonitor™ 2012 Released!

GFI WebMonitor 2012, one of the industry’s leading web security solutions for small and medium-sized businesses (SMBs), has been released today. Last fall, the company introduced several innovations to enable SMBs to better defend their networks, including a website safeness rating, stronger blocking of malicious URLs and more robust protection against zero-hour threats. Today, GFI Software announced GFI […]

Continue reading

Research: Web Browser War, Security Battle in 2011

No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, as in 2010, web browsers had the higher number of security vulnerabilities reported compared to […]

Continue reading

Survey: UK Lags US in Using the Cloud to Combat Spam [INFOGRAPHIC]

Spam may not be the headline-grabbing topic it once was, but as our research friends in the GFI Labs continue to point out, spam and phishing attacks are still a preferred tactic of cybercriminals. To get a better sense of how businesses are coping with spam, we conducted a survey this month of 200 US […]

Continue reading

Email Security Checklist

Researching email security solutions or seeking to upgrade or replace yours? This handy email security checklist tells you what you need to keep in mind when evaluating an email security solution for your business.

Continue reading

The Most Vulnerable Operating Systems and Applications in 2011

As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I collated for 2011. To begin with, National Vulnerability Database (NVD) reports 3532 vulnerabilities in 2011. […]

Continue reading

The Ultimate Network Security Checklist

Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and tricks for getting the job done? Here it is – The Ultimate Network Security Checklist: a […]

Continue reading

How to Protect Your Network against DDoS Attacks

The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism,  DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just recently, the CIA’s main website was allegedly brought down by a DDoS attack launched by […]

Continue reading

ACTA and the Anti Circumvention Clause

This citation concerns you: “Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with exercise of their rights in and that restrict acts in respect of, their works, performances and phonograms, which are not […]

Continue reading

5 Ways Valentine’s Day can Cost Your Business

Most businesses look forward to Valentine’s Day as the next big-bucks occasion following the holiday period. People are still reeling from their holiday spends in January, but come mid-February they are ready to pull out the plastic again to spend their hard earned cash on gifts for that special someone in their life. What many […]

Continue reading