Latest posts

Page 9

SMS for business gets the message across [Infographic]

According to statistics in a recent report by SAP, 74 percent of adults use SMS on a regular basis, and 64 percent said they believe businesses should make more use of SMS to interact with their customers.

Continue reading

23 network security mistakes that could get you fired

Depending on your boss, the impact to company or customer and seriousness of a mistake, some can be career-limiting or, even worse, send you back to the job market before you even know it. Let’s take a look at those network security mistakes that could get you fired.

Continue reading

GFI MailEssentials wins 5th VBSpam+ award from Virus Bulletin

In the January 2015 round of testing, GFI MailEssentials had a spam catch rate of more than 99% and 0 False Positives, thus winning a 5th VBSpam+ award.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

Third party patch roundup – January 2015

Although Microsoft issued only eight updates this month, Apple and Linux systems both saw fixes for more vulnerabilities than usual, Oracle released its regular quarterly critical update, and Adobe found itself having to get out not just one but two out-of-band updates.

Continue reading

Can you secure your keep?

In how many ways can one of your network’s hosts become compromised? Well, according to independent security testing company The AV-TEST Institute, somewhere north of 300 million.

Continue reading

Adobe fixes second vulnerability in Flash

Last week, Adobe made the headlines again with a zero day vulnerability in their Flash Player software. Over the weekend, they put out an update to fix a second such vulnerability; this one impacts both IE and Firefox when running on all currently supported versions of Microsoft’s Windows operating system.

Continue reading

Whose airwaves are they, anyway?

How do you balance private property rights with the right to use those public airwaves no matter where you are?

Continue reading

Exploit Kit strikes again: Attackers taking advantage of unpatched Flash vulnerability

Adobe Flash is in the news again, with reports of a new zero day vulnerability in Flash Player being exploited with the help of an exploit kit called Angler.

Continue reading

Introduction to permissions, Part 4: Troubleshooting permissions and best practices

In the last part of our Permissions series, we’ll look at troubleshooting permissions and some best practices.

Continue reading