Latest posts

Page 61

May Webcast Line-Up

Every month we organize some exciting FREE webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!

Continue reading

A Deeper Look at Spam and Malware Filtering with Exchange Server

There are various spam filtering tools at an Exchange admin’s disposal. How can these be used to leverage Exchange itself? What other solutions are there to defend against spam and malware? Read on.

Continue reading

The Top 5 Online Security Traps and how to Avoid Them

It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to share with your network users on five common online security traps.

Continue reading

Survey: 5 Most Ridiculous Things IT Admins Have Seen Business Users Do [INFOGRAPHIC]

If you work in an office, chances are you have seen a frantic IT guy or gal running around trying to put out virtual fires, and you’ve wondered what all the fuss was about. In addition to the numerous, legitimate, technical glitches that can come up when operating a data center, there are also lots […]

Continue reading

The Perils of Public Wireless Networks

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This video sheds more light on those risks and shares some useful tips on how to […]

Continue reading

57 Simple Sys Admin Mistakes that Someday You’ll Regret

When it comes to IT, simple mistakes can cost you big time. Whether that is immediately or not depends on a number of factors, and sometimes, when something has gone incredibly wrong, you won’t even realize that the root cause was a snap decision or simple oversight you made months ago. If you parse this […]

Continue reading

European Legislation Might Outlaw Security Tools

In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which could also be used by people with malicious intent such as disassembles – would be […]

Continue reading

Why you need to run a vulnerability assessment

The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they are. That’s were a vulnerability assessment comes in – find out more in this video.

Continue reading

GFI Malta Enjoys a Traditional Treat

Even if you’re living on a beautiful sunny island in the middle of the Mediterranean Sea, Monday blues can hit you – especially after a holiday weekend. But that wasn’t the case for the GFI Malta team whose morning was brightened up by a fellow colleague who surprised them with a GFI version of a traditional Maltese […]

Continue reading

You’ve got All Your Security Technologies in Place… Now What?

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to enforce an organization’s network security but the journey shouldn’t stop there. You can only achieve […]

Continue reading