Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Every organization has its own rule book or set of procedures that management or HR expects employees to follow religiously. These ‘rules’ stipulate when employees are to start and finish work; when they can take their lunch break or how …
This is the second post of a three part series in which we explore the world of svchost.exe. In Part 1, we introduced the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well as why it …
Computer running slower than usual? Most probably an application taking up too many resources. Up goes the task manager to have a look under the hood – nothing strange located in the default list. You click on “Show processes from …
Running any business during these turbulent times is stressful. Operating an IT Support Business which deals with those businesses most affected by the recession – smaller companies — is especially nerve-wracking. We think tthat the best way to reduce stress …
Determining the fine line between security and usability is a hard task for everybody involved in IT security, from software developers to network administrators. The lack of balance between these two items is one of the main reasons that can …
Faxing is sometimes seen as an outdated procedure in today’s world of email; however, there are still many companies that rely on their fax machine and correspond with their clients via fax. If one of your suppliers is one of …
After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer …
In a previous post, I talked about the importance of security education and awareness programs for employees. If you are an IT administrator or a business owner reading this blog you may feel that in theory this is great and makes sense, …
We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming …
David Kelleher, communications and research analyst at GFI Software is back this week discussing the need for companies to educate their employees on basic security principles. In last week’s podcast, David touched upon what GFI are doing to help SMBs …