Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that. …
As an MSP, the software you run can determine your services and profitability. Are there times when you feel a lack of flexibility in software hurts your business? Have you ever had to turn away business because your MSP does …
Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!
Some of my younger friends may not have ever encountered an old-fashioned fax machine, but I remember them well. There was a time when it seemed nothing short of a miracle to feed a document into it and have someone …
In GFI Cloud’s most significant release since its launch last year, a new service is added to this web-based platform – patch management. In this Q&A style interview, Jackie Wake, product marketing manager for GFI Cloud, tells us a bit …
We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.
If you’re in an environment where users are allowed to use browsers other than the default Internet Explorer (IE), you should know that these programs will use settings outside of the Microsoft defaults. Employees using other browsers will also need …
Have you ever been confronted by a decision that seemed so ill-advised or just plain wrong that you couldn’t believe anyone would make it? Has that been something either directly related to, or impacting security? If so, then there’s probably …
Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …
At GFI we love cake. So what better excuse could there be to indulge in some cupcakes than GFI MailEssentials winning Messaging Product of the Year at the Network Computing Awards 2013 last month?