Tag Archives: EndPointSecurity

FrugalBrothers Software, Inc. featured in GFI Software Case Study

Recently I had the opportunity to participate in a GFI case study for the popular GFI FaxMaker software. Last Tuesday March 10th 2015, a video production company visited me in my home office to record the case study. They carried with them a ton of lighting and state of the art video gear.

For those of you unfamiliar with the term “case study” here is the best way to explain it. A case study is an examination of how a customer uses a product, and how the product benefits their business, and or improves their business processes.
Continue reading

GFI White Paper: PCI-DSS compliance and GFI Software™ products

The Payment Card Industry Data Security Standard (PCI DSS)
compliance is a set of specific security standards developed by the
payment brands* to help promote the adoption of consistent data
security measures that are needed to protect sensitive payment card information.

Download The White Paper: PCI-DSS

When “Small” is “Big” – Small Thumb Drives Continue to Be a Big Security Threat

The leakage of ‘top secret’ information from the NationalThumb-Drives-Continue-to-Be-a-Big-Security-Threat-200x300 Security Agency (NSA) by former contractor Edward Snowden, has sent shockwaves throughout US security institutions. Not only have the documents alleged ‘snooping by the US authorities’ but the theft of data via a USB stick has hit the institutions’ credibility hard – really hard.

If top secret files can be leaked from the NSA, you can imagine how much easier it is for a business to lose data in the same manner! The question is, can it be prevented?

Since most businesses rely on computers to store important information, and the means to steal data are available to anyone, it is often not a matter of “if” anymore, but a matter of “when” someone will remove this data.
Continue reading

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.
Continue reading

Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?

It is not uncommon for marketing teams or Advanced-Persistent-Threat-300x200advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. Should we consider this term to be another form of scaremongering or is there a real threat behind it? This blog post will briefly outline what APT is and whether or not organizations should take what we are told by the advertising gurus with a pinch of salt.
Continue reading

Removable Storage: A Convenient Truth

Removable storage devices offer a big Removable-storage-devices-300x200convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card or drive also makes it easy for employees (or anyone else who can gain physical access to one of your networked systems) to deliberately steal critical data or inadvertently subject it to unauthorized exposure. That could lead to a very costly disaster if company secrets get into the hands of competitors or if sensitive data (such as clients’ personal information) is exposed in violation of regulatory stipulations.
Continue reading

The Top 89 Admin Pet Peeves

Pet peeves, annoyances,Admin-Pet-Peeves irritations, grievances, vexations…if you are an IT admin, I bet you have a few. We all do. There are just some things that can set one admin off on a wild tear, while others go on nonplussed. Here is our completely unscientific, unranked and arbitrary list of the top 89 admins’ pet peeves. Some may give you a chuckle; others may strike a sympathetic chord. Read through the list, and then leave a comment letting us know if we nailed your personal biggest hate, or missed it completely.
Continue reading

Using pirated software? Swashbuckling with risk!

Pirated-Software-227x300We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.

How do cracks work?

When hackers crack software, they modify the program’s code. Depending on the copy protection mechanics, the modification required can be as simple as changing one byte to something as complex as rewriting chunks of code. Before any of this can be done, a hacker will have to reverse engineer the software and understand how the copy protection mechanism works. This requires skill – more skill than that required to modify the software in order to defeat said copy protection. Why is this important? Someone who is capable of cracking software is probably also able to modify it in any way they see fit. This is where security risks come into play.
Continue reading

Removable Storage: A Convenient Truth

By:Debra Littlejohn Shinder on March 18, 2013

Removable-storage-devices-300x200Removable storage devices offer a big convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card or drive also makes it easy for employees (or anyone else who can gain physical access to one of your networked systems) to deliberately steal critical data or inadvertently subject it to unauthorized exposure. That could lead to a very costly disaster if company secrets get into the hands of competitors or if sensitive data (such as clients’ personal information) is exposed in violation of regulatory stipulations.
Continue reading