Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

Security policies: making them work for you – Part 1

on July 10, 2009

Every organization has its own rule book or set of procedures that management or HR expects employees to follow religiously. These ‘rules’ stipulate when employees are to start and finish work; when they can take their lunch break or how …

0

Exploring svchost.exe – Part 2

on July 7, 2009

This is the second post of a three part series in which we explore the world of svchost.exe. In Part 1, we introduced the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well as why it …

1

Exploring svchost.exe – Part 1

on July 7, 2009

Computer running slower than usual? Most probably an application taking up too many resources. Up goes the task manager to have a look under the hood – nothing strange located in the default list. You click on “Show processes from …

0

How can I make IT Support business less stressful?

on July 7, 2009

Running any business during these turbulent times is stressful. Operating an IT Support Business which deals with those businesses most affected by the recession – smaller companies — is especially nerve-wracking. We think tthat the best way to reduce stress …

0

Security and Usability: Finding the Right Balance

on July 7, 2009

Determining the fine line between security and usability is a hard task for everybody involved in IT security, from software developers to network administrators. The lack of balance between these two items is one of the main reasons that can …

0

The Benefits of Integrated Network Faxing

on July 6, 2009

Faxing is sometimes seen as an outdated procedure in today’s world of email; however, there are still many companies that rely on their fax machine and correspond with their clients via fax. If one of your suppliers is one of …

0

21st Century Heists – Part 3

on July 3, 2009

After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer …

0

Security awareness: taking the first steps

on July 3, 2009

In a previous post, I talked about the importance of security education and awareness programs for employees. If you are an IT administrator or a business owner reading this blog you may feel that in theory this is great and makes sense, …

0

21st Century Heists – Part 2

on July 2, 2009

We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming …

0

Podcast – Educating Employees about Security Awareness

on July 2, 2009

David Kelleher, communications and research analyst at GFI Software is back this week discussing the need for companies to educate their employees on basic security principles. In last week’s podcast, David touched upon what GFI are doing to help SMBs …

0