Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 2)

on June 15, 2009

In Part 1 of this post we examined how SPF works. Now we’ll go into how to create and publish SPF records. Creating an SPF record for your domain The procedure outlined below can be divided into several stages: Determine …

0

GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 1)

on June 15, 2009

The Sender Policy Framework (SPF) is a community-based effort that requires senders to publish their mail server in an SPF record. This record is used to detect forged senders. How does SPF work? The basic idea behind Sender Policy Framework …

0

UK SMEs underestimate danger posed by their employees

on June 15, 2009

Whilst most SMEs recognize the importance of IT security in a company and would consider installing anti-virus and anti-spam software, they often fail to realize the internal threats that could pose a risk to their business. Disgruntled employees, such as …

0

Helping SMBs take definite steps to face security threats

on June 15, 2009

It’s not always easy for a business to survive in a cutthroat market, especially one that is going through an economic downturn. Therefore, when already hard on cash, and striving to maintain revenues and profits, the last thing that a …

0

The current and future SPAM storms

on June 15, 2009

You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’

0

Taking Security Seriously

on June 15, 2009

In today’s world one can claim that nearly any organization to operate needs an IT infrastructure. It can be a simple system such as a basic point of sale for a small corner shop to a full fledged IT infrastructure working across continents joining international organizations into one cohesive structure. All systems, be it the smallest up to the largest have one thing in common, they all want to simply get the job done.

3

Conficker, at the airbase and hospital near you…

on June 15, 2009

Old news: Fighter jets grounded, base infected with Conficker! Recent news: Hospital equipment infected by Conficker worm! What? How can a supposedly secure environment like a military installation or a hospital catch a worm? Panic everywhere. Why is everyone so …

0

MSPs – Begin at the Beginning

on June 12, 2009

Having run an IT Support Company for a few years, I arrived at the conclusion that that an IT Support Company/MSP needs the following Internal Systems: Monitoring System Remote Support & Management Tools Helpdesk System CRM/Purchasing/Logistics System Billing / Financial …

0

Exchange MVP Uses HD to catch bad guys

on June 9, 2009

Simon Butler, aka Sembee,  Microsoft Exchange Server MVP, author of the technical articles at amset.info, and Director of Sembee Ltd. Over the weekend one of my clients suffered an authenticated user attack on the SMTP interface of the Exchange 2003 …

0

HoundDog, now GFI MAX, become MSP Partners Gold Sponsor

on June 8, 2009

We’re pleased to announce that we’ve recently agreed to become ‘Gold Sponsors’ of MSP Partners; an alliance established by leading IT manufacturers to provide solution providers with a comprehensive and collaborative online education source dedicated to Managed Services.  Chief Executive, …

0