Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

Security: The Human Element

on June 22, 2009

One aspect of security that is often overlooked is the Human Element. People are a factor in IT infrastructure and as such are also a possible attack vector. Business organizations should take this aspect of security as seriously as any …

0

Podcast: Investing in security for SMBs

on June 19, 2009

David Kelleher, communications and research analyst at GFI Software discusses how GFI are helping SMBs to recognize the importance of investing further in their security. The main cause of the problem lies in the attitude that SMBs have towards security, …

0

Customers WILL pay more for more value

on June 18, 2009

A random thought popped into my (mostly empty) head this morning.  During the last few years that I was running my IT company, I changed from being very nervous when asking for money to being much more comfortable.  I think the turning point was a book …

0

Marketing Idea for IT Support/MSPs

on June 16, 2009

Just an throwaway marketing thought… It’s a scientifically proven fact that people tend to adopt a ‘herding instinct’ in times of uncertainty. I think the decision process goes something like this: ‘Jeezo – I’m worried. The quickest way I can …

0

Computer Security in the News

on June 15, 2009

Viruses, Trojans, worms, spyware, malware, rootkits, phishing, botnets, cross-site scripting, vulnerabilities… the list of buzzwords goes on. These words all mean something to us in the security arena, but for the general public they’re just  indistinguishable words that geeks use. …

0

GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 2)

on June 15, 2009

In Part 1 of this post we examined how SPF works. Now we’ll go into how to create and publish SPF records. Creating an SPF record for your domain The procedure outlined below can be divided into several stages: Determine …

0

GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 1)

on June 15, 2009

The Sender Policy Framework (SPF) is a community-based effort that requires senders to publish their mail server in an SPF record. This record is used to detect forged senders. How does SPF work? The basic idea behind Sender Policy Framework …

0

UK SMEs underestimate danger posed by their employees

on June 15, 2009

Whilst most SMEs recognize the importance of IT security in a company and would consider installing anti-virus and anti-spam software, they often fail to realize the internal threats that could pose a risk to their business. Disgruntled employees, such as …

0

Helping SMBs take definite steps to face security threats

on June 15, 2009

It’s not always easy for a business to survive in a cutthroat market, especially one that is going through an economic downturn. Therefore, when already hard on cash, and striving to maintain revenues and profits, the last thing that a …

0

The current and future SPAM storms

on June 15, 2009

You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’

0