Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+

How to confirm your systems aren’t suffering a major Heartbleed

on April 15, 2014

The Internet was rocked last week when a two-year-old bug in OpenSSL was revealed. Heartbleed, as the vulnerability is known, can result in massive information disclosure through simple requests that require no privileges, and leave no logs. Anything from command …


IT administrator, could this blog post change your life?

on January 23, 2014

It’s an extremely tough job being an IT or security administrator today; and speaking as someone who works in the tech industry, I for one take my hat off to you! As an IT or security administrator, you are at …


IT security: A small and medium-sized business checklist

on January 22, 2014

Effective IT security is a must for businesses of any size. Security breaches can prove to be embarrassing, costly and damaging to the organization. Here’s a basic IT security checklist to help you ensure you’ve covered all the important bases.


2014: The year of doing more with web filtering data? [Infographic]

on January 21, 2014

As an IT Administrator, you endeavour to ensure that the technology you choose to use makes a positive impact on the business, and you are always looking for new ways to use technology that will bring additional benefits to your …


The privacy of things

on January 20, 2014

The right to privacy is something we take for granted. If we are in the comfort of our homes, on the phone to a relative or friend or simply sending an email from a personal account, we expect that no …


Next Gen IT: It’s More Than Just the Cloud

on January 17, 2014

As we head into the middle of the second decade of this new millennium, it seems all eyes in the IT world are cast upward, to the Cloud. There’s no doubt that cloud computing is set to create a paradigm …


A Way with Words: Melding the Worlds of Fact and Fiction

on January 16, 2014

John Bonello is a Technical Communicator at GFI and a published author of award-winning fantasy works. Angelica Micallef Trigona interviews him to learn how he bridges both worlds. Q: You are a Technical Communicator at GFI, working on manuals, handbooks, …


The Big Tip for 2014: Network Security Begins with Automated Patch Management

on January 14, 2014

Welcome to 2014! It’s the start of another year, and who knows what new threats, viruses and Botnets will be uncovered in the coming months? The good news is that whereas the ingenuity of hackers may keep us guessing, the …


Running XP? Tick-Tock, You’re On the Clock

on January 10, 2014

How long would you drive a car built with parts the manufacturer decided to stop making? One day? One week? One month? One year? Whatever your answer, there’s a certain amount of risk you assume upon hopping behind the wheel.


An Introduction to E-Discovery (Part 2)

on January 8, 2014

In part two of this two-part series, I discuss the e-discovery process (EDRM) and highlight two common e-communications archiving architectures used by organizations today as part of their e-discovery strategy. If you missed part one, check it out here.


Snapchat Breach: Good, Bad or Just Plain Ugly?

on January 6, 2014

Looking for a technology story to follow in these first days of 2014? The suggestion here is the Snapchat data breach, specifically what comes of it. The leak of 4.6 million usernames and phone numbers occurred on New Year’s Eve, …