Tag Archives: GFI

Keeping Customer Credit Card Data Safe With PCI-DSS

What is PCI-DSS? It stands for Payment Card Industry Data Security Standard. PCI-DSS applies to all business that accepts credit card information, stores credit card information , or any information about the cardholder. Yes, even Mom and Pop operations fall under PCI-DSS regulations.

What is good to know that there are 4 different levels that can apply to you. Almost everyone stats off at level 4 if you process less than 20,000 transactions per year. The more transactions your company does, the higher your level will rise. At bare minimum as a level 4 merchant or company, you must complete a Self Assessment Questionnaire, and may have to pass a can of your network by a A.S.V. (Approved Scanning Vendor)
Continue reading

What’s new in GFI WebMonitor 2015?

GFIWebMonitor2015_SQThe Internet is a world of information and opportunity. Every business knows that. What not all businesses realize is that the Internet can be a nasty piece of work with cybercriminals all too happy to pounce on unprotected networks. Monitoring, managing and securing a business network is a must today.  Product manager, Calin Ghibu explains why the latest version of GFI WebMonitor is the next generation of web security software for businesses and what’s so special about this release. Continue reading

20 things that could happen when there’s no web monitoring software

WorstThatCouldHappen_SQNobody wants to be the Internet Police. We’re probably all very happy with unrestricted Internet access, and it’s none of our business what other people do online.

That all changes in a business environment. Since the company’s PCs are company assets, the company pays for bandwidth, and there are all sorts of threats out there even for users who are doing the right things, companies need Internet monitoring and filtering. It has nothing to do with policing the Internet but it has everything to do with safeguarding your network, assets, investment and reputation.
Continue reading

Block harmful websites or else…

BlockHarmfulWebsites_SQMost companies these days provide Internet access to their employees. Most employees consider Internet access like coffee service – something that they take for granted. While this is a great thing for both employers and employees to have, when that Internet access is completely unrestricted, bad things can happen with alarming frequency. Companies’ IT or security teams need to implement technical protections to block harmful websites, or employees can quickly find their workstations compromised by malware. Let’s first discuss why you would want to block harmful websites, and then how. Continue reading

Improving productivity with Internet monitoring software

InternetMonitoring_SQThe Internet is one of the best and most powerful information tools but it can be an enormous time sink if employees in the company have unrestricted Internet access. When those constantly on Facebook, Tumblr, Reddit and the rest are on the clock, that’s time and money they are taking away from the business! Providing users unrestricted Internet access is great, but not when it causes productivity issues. One way to deal with the problem is to manage and monitor access to the Internet so that you are efficiently using bandwidth, maintaining productivity and keeping employees happy.
Continue reading

The latest updates from the GFI Cloud team

CloudRemoteAdministration_SQElad Schreiber, Product Manager for GFI Cloud, talks about the latest release and the addition of remote administration tools to the Monitoring feature.

Q: Tell us about the latest GFI Cloud release?

This release sees further enhancements to GFI Cloud’s Monitoring service with the introduction of a set of remote administration tools.  Command Line, Process Manager and PowerShell command line will be familiar tools for most of our customers, and by incorporating these into the GFI Cloud platform they will now be able to use these tools remotely, from the same online console as the rest of their GFI Cloud services. Continue reading

Tom Merritt: The Making of a Top Technology Journalist – BCW438

Tom Merritt joins us as our guest this week. Tom started his broadcasting career at WGEL Radio in Illinois in 1986. After working in Radio for a number of years, Tom began to focus on technology. Tom joined the cast at Tech TV and began producing programming mixing the web and television. He then moved to Cnet, and worked on creating the popular Buzz Out Loud podcast. Tom also worked with Leo Laporte’s TWiT network. Tom currently is an independent journalist, and is working hard to build his brand.
Continue reading

Tech Sector vs. Government Surveillance: The Battle Lines Are Drawn, but Are They a Little Fuzzy?

If you have been following the newsTech-Sector-vs.-Government-Surveillance-privacy about covert surveillance by the NSA and FBI recently, you might get the impression that companies like Google®, Microsoft™, Apple®, Facebook and Twitter have become sort of champions for the man in the street.  You could see the telling signs as soon as the facts began to emerge: changes in Google Chrome™ browser, SSL encryption across the board on Facebook, vocal posturing in public about privacy from iCupertino, and so on.

Reading the reactions from the tech giants, I cannot but think that their public displays of ‘resistance’ are less about championing for the greater good and more about ‘something else’.
Continue reading

The Problem with Patching Is – Not Patching!

running-patch-management-300x200

Patching is not something that the IT department really enjoys doing. It is complicated and ongoing. It takes forever and it doesn’t add any actual business value.

Meanwhile you have myriad systems to patch, and endless patches to test and then install. Then you have to do it all over again. And again. And again.

No wonder a recent study by the UK-based Federation of Small Business shows that little more than a third (36%) of small shops patch regularly. Then these shops wonder why they got compromised, or blame their software vendors, especially Microsoft® – a common security punching bag!

Patching, well, patching properly, solves the majority of security problems. In fact 90% of successful exploits are against unpatched systems.

Even environments that should presumably be highly secure too often fail to patch. Last year an audit at the U.S. Department of Energy found that some 60% of their desktops lacked important patches.

Continue reading

Patch management: Fixing vulnerabilities before they are exploited

Introduction

Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis.

While software updates serve many important roles, be it delivering feature improvements or fixing bugs and security vulnerabilities, they bring with them a number of potential challenges for the IT Department in terms of ensuring systems are up-to-date, that new problems are not introduced by patches designed to fix things, and updates do not create compatibility or instability issues. All this needs to be done while ensuring that updates are pushed to PCs as quickly as possible to prevent vulnerabilities being exploited. The constantly evolving software landscape makes patch management an important consideration for all IT decision makers,regardless of organization size.
Continue reading