Could your business survive a day without IT?

No ITMost of us take reliable technology for granted – just like modern conveniences such as electricity and running water. But what if you had no access to IT for a whole day…how would that affect your business?

What do you do when there is a power-cut? Often, you’ll walk into the kitchen and immediately try to switch the light on, or power up the kettle to make a hot drink. Even though you know there’s a power outage, you’re so used to having on-demand access to certain things that it takes a second to realize the true implications.

The same thing applies when IT systems go down. Initially, it’s all a bit different and perhaps even a little exciting. Staff may even relish the prospect of a slightly longer lunch-break, or a guilt-free gossip around the water-cooler. However, it doesn’t take long before reality sets in.
Continue reading

Organized cybercrime: bad guys go pro, highlighting “customer service”

J003-Content-OrganizedCybercrime_SQBack when I was a police officer in suburban Texas, most of the criminals I dealt with weren’t very bright. Burglars and embezzlers, druggies and drunk drivers and domestic violence perpetrators, they had that in common. Even the ones who were well educated and held impressive job titles weren’t nearly as clever in carrying out their illicit activities. You see a lot of brilliant criminal masterminds in the movies but we didn’t see many of them in real life. But that was in Life 1.0, a.k.a. Life before the Internet.

One of the things that always made it easier for law enforcement to catch and prosecute the bad guys was the fact that the majority worked alone or with one or two fumbling, bumbling partners. From petty thievery to murder, most crimes weren’t well-thought-out. Criminal types were usually impulsive and consequently made a lot of mistakes that led to their downfall. The exception was organized crime, exemplified by the Italian Mafia – and members of those criminal organizations proved much more difficult to bring to justice.
Continue reading

Network vulnerabilities are on the rise! Ensure your network devices are protected.

The number of reported security vulnerabilities in 2013 continued to increase compared to 2012. Vulnerabilities are on the rise constantly increasing since 2011. The high severity vulnerabilities increased by 16 percent from 2012.
Continue reading

5 security mistakes SMBs make and their simple solutions

Top 5 network security mistakes & their simple solutions

IT resources in small and medium-size businesses are often limited and time savers are welcome. But some security short cuts may put your business at risk costing more than time in the long run. Here are five of the most common security mistakes SMB’s make and their simple solutions.
Continue reading


Choosing the right patch management software

Choosing the right patch management software

For the small to medium size businesses fighting to grow and make a profit automating everyday IT tasks is vital.

Even in larger organizations where IT teams are small and have a lot to do proactive threat management remains a low priority. That’s where automatic vulnerability and patch management comes in. Add deep network analysis and comprehensive risk assessment to the mix and you really have something of great value.
Continue reading

GFI LanGuard® Step by step guide

GFI LanGuard is a leading network security scanner and patch management solution that acts as a virtual security consultant. It gives you a complete picture of your network setup, provides risk analysis and helps you maintain a secure and compliant network with minimal effort. So how does LanGuard work?

Continue reading


Safeguarding your emails and files with GFI MailArchiver 2014

Safeguarding email is a must in today’s litigious society J003-Content-MailArchiver2014-300x300and archiving is the only way a company can do so effectively and securely. A new survey by GFI Software shows that more than half of respondents reported using their inbox as a document storage device and that external cloud-based storage alternatives are also posing a risk.

A new version of GFI MailArchiver is available today and we asked its product manager, Ian Bugeja, to tell us how GFI’s award-winning solution can help companies combat this problem.

Q: What’s the big news with GFI MailArchiver 2014?

Files. File archiving to be more precise. In earlier versions we had introduced a feature whereby users could manually archive files. Our customers loved this function and the recent increase in cloud-based storage services has only highlighted the importance of file archiving within the organization. That is what we have set out to address with the latest version of GFI MailArchiver. Road warriors are constantly using and saving files wherever it is convenient for them and the company often has no clue where these files are stored. We introduced new features that eliminate the need for employees to use public cloud-based services for document storage and this is done automatically for them.
Continue reading


12 email tips to share with your users

Unsolicited email or spam may be a mere nuisance for most anti-spam-300x300emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email.
Continue reading


How to License GFI LanGuard

GFI LanGuard 2014 R2 is a network vulnerability scanner, patch management, and network auditing tool. There are currently over 1,500,000 nodes with LanGuard deployed.In this article I will answer some of the most frequent questions I receive about licensing GF LanGuard.

Continue reading


How to Improve Your Company’s Cyber Security with GFI LanGuard

Recently, a small bank in Wyoming with a 1 man IT department contracted a nasty computer virus that their antivirus did not catch. The virus caused a huge loss in production and new business.

Because their Big Name antivirus failed to detect the virus, the bank began looking for an alternative. How did this happen? Because today computer crackers (The Bad Guys) are exploiting third party applications such as Java, or Adobe Flash. Also there may be machines on the network with outdated antivirus definitions.

Continue reading