maxresdefault

FrugalBrothers Software, Inc. featured in GFI Software Case Study

Recently I had the opportunity to participate in a GFI case study for the popular GFI FaxMaker software. Last Tuesday March 10th 2015, a video production company visited me in my home office to record the case study. They carried with them a ton of lighting and state of the art video gear.

For those of you unfamiliar with the term “case study” here is the best way to explain it. A case study is an examination of how a customer uses a product, and how the product benefits their business, and or improves their business processes.
Continue reading

Cloud-Asset-Track-Screen

FrugalBrothers Now Offers ControlNow

FrugaBrothers Software, Inc. is putting extra emphasis on cloud based network solutions in 2015. In particular, the ControlNow cloud based IT management platform formerly known as GFI Cloud. The benefits of platform for small business are absolutely incredible.

So what is ControlNow?

ControlNow is a suite of 6 individual cloud based IT management tools that can be purchased separately or in multiple services. Each service is deployed through the ControlNow portal, and the installation of a small agent. A small business can be up and running the ControlNow services within a few minutes, without the upfront cost of on premise software, or hardware such as an appliance.

What are the services?

ControlNow contains 6 different services:

• Antivirus
• Patch Management
• Workstation and Server Monitoring
• Web Protection
• Remote Control
• Free Asset Tracking

With these tools, even the smallest business can easily afford state of the art network security and IT administration. ControlNow is a easy to use platform that is available from FrugalBrothers at a low cost. Click here for a free 30 day trial.

2012-Mastercard-Logo-DS

FrugalBrothers Software Inc. Renamed to FB Security Group

PCI DSS Compliance

FrugalBrothers Software is pleased to announce the transition to FB Security Group effective February 1st 2015. The company will offer PCI Compliance services for small to mid-size businesses throughout North America. FB Security Group will offer an array of services including Compliance Audits, Quarterly and Annual Vulnerability Assessments, Remediation Services, SAQ Preparation (Self Assessment Questionanaire) and more. We will begin by working in the retail, financial services and healthcare industries. FB Security Group can also provide software technologies; both cloud and on-premise based to maintain PCI-DSS compliance. For further information please contact Bruce Naylor via email at bruce.naylor@frugalbrothers.com

1280px-WinonaSavingsBankVault

FrugalBrothers Now Offering GFI Software Installation and Configuration Services

FrugalBrothers is pleased to announce it will now offer installation and configuration of GFI Software products in North America. We have recently added network support engineers and now offer the ability to install and configure top GFI network security products. We now offer both remote and on-premise installation and configuration of all GFI network security and email protection tools. FrugalBrothers has been a GFI partner since 2006 and has been a Gold Level partner for the last 8 years. Having recently added network security engineers to our staff, FrugalBrothers is now poised to become full service IT Security Firm. For more information please contact Bruce Naylor at (260) 724-2748 or email bruce.naylor@frugalbrothers.com

10 Surefire Ways to Lose Your Sysadmin Job

I just came a across an article that I wanted to discuss. The article is titled “10 security mistakes that will get you fired” written by Roger A. Grimes. I have know too many sysadmins and IT security specialists that have committed at least one or more of these huge mistakes. I’ll cover the highlights here with a link below as well.

Mistake #1 Killing Business Functionality

Although network security is job one to a IT professional, it is not to the company you are working for. Closing down critical business information systems while trying to remediate an intrusion can find you in hot water with management. Just assume management will believe the loss of business systems will outweigh the cost ridding the system from the bad guy.s
Continue reading

1024px-Credit-cards

Keeping Customer Credit Card Data Safe With PCI-DSS

What is PCI-DSS? It stands for Payment Card Industry Data Security Standard. PCI-DSS applies to all business that accepts credit card information, stores credit card information , or any information about the cardholder. Yes, even Mom and Pop operations fall under PCI-DSS regulations.

What is good to know that there are 4 different levels that can apply to you. Almost everyone stats off at level 4 if you process less than 20,000 transactions per year. The more transactions your company does, the higher your level will rise. At bare minimum as a level 4 merchant or company, you must complete a Self Assessment Questionnaire, and may have to pass a can of your network by a A.S.V. (Approved Scanning Vendor)
Continue reading

Does your bandwidth belong to autoplay videos and ads?

AutoplayBandwidth_SQWith Facebook’s recent announcement that they will allow video ads to automatically play in your news feed, three things are clear. The first is that the entire Internet just took an enormous step backwards into the 1990s (think GeoCities and webpages with music). The second is that most of us will either surf with our speakers turned off, or at least keep our fingers poised over the mute button. And the third is that bandwidth consumption is going to climb, no, skyrocket as more and more sites follow suit.

Since advertising seems to be the only reliable way to make money on the Internet, we should have seen this coming, but I for stopped going to CNN when they started playing their news videos automatically and and at full volume; so this is a trend that bothers me. And when you pay for bandwidth consumption because you are on a metered connection or mobile device, it’s not just the websites that are going to make money from advertising! But what can you do about it? Quite a bit, actually!
Continue reading

Mavericks_Surf_Contest_2010b

What’s new in GFI WebMonitor 2015?

GFIWebMonitor2015_SQThe Internet is a world of information and opportunity. Every business knows that. What not all businesses realize is that the Internet can be a nasty piece of work with cybercriminals all too happy to pounce on unprotected networks. Monitoring, managing and securing a business network is a must today.  Product manager, Calin Ghibu explains why the latest version of GFI WebMonitor is the next generation of web security software for businesses and what’s so special about this release. Continue reading

Tonight’s forecast…cloudy with a chance of compromise!

DropboxIncident_SQOver the past few weeks we have seen data on cloud storage services being compromised. Celebrities’ personal photos were stolen from Apple’s iCloud service. Then Snapchat was compromised, with both photos and videos were stolen. Now, Dropbox is reacting to what they say is a compromise of another service’s credentials store that is being used to compromise Dropbox accounts of users who use the same username and password on multiple services.

A common theme across all of these is clear… cloud services are being compromised. Does this mean you should not trust cloud services? Pull all your data back down to local storage and cancel your Internet connection? Go off the grid and return to the trees? Of course not! Cloud services are a major component of our connected lives, and it is not at all true that they are inherently unsafe or vulnerable. They are, however, accessible from literally anywhere in the world, so most people should take more precautions with their data than they may be accustomed to.
Continue reading

How much do you trust technology?

TrustTech-Oct_SQIt sometimes seems as if we’re abdicating more and more of the control over our everyday lives and handing it over to computers. Machines are analyzing the data and making many of the decisions that used to be the province of human beings. In some cases, this has had very positive results; in others, not so much.

A study conducted by Oxford University about a year ago said that almost half of the jobs currently occupied by people in the U.S. could be performed by computers. The combination of computers and robotics has already infiltrated many fields, with technology taking the place of pharmacists, legal researchers and document reviewers, reporters and more.
Continue reading