Recently I had the opportunity to participate in a GFI case study for the popular GFI FaxMaker software. Last Tuesday March 10th 2015, a video production company visited me in my home office to record the case study. They carried with them a ton of lighting and state of the art video gear.
For those of you unfamiliar with the term “case study” here is the best way to explain it. A case study is an examination of how a customer uses a product, and how the product benefits their business, and or improves their business processes. Continue reading →
I just came a across an article that I wanted to discuss. The article is titled “10 security mistakes that will get you fired” written by Roger A. Grimes. I have know too many sysadmins and IT security specialists that have committed at least one or more of these huge mistakes. I’ll cover the highlights here with a link below as well.
Mistake #1 Killing Business Functionality
Although network security is job one to a IT professional, it is not to the company you are working for. Closing down critical business information systems while trying to remediate an intrusion can find you in hot water with management. Just assume management will believe the loss of business systems will outweigh the cost ridding the system from the bad guy.s Continue reading →
The number of reported security vulnerabilities in 2013 continued to increase compared to 2012. Vulnerabilities are on the rise constantly increasing since 2011. The high severity vulnerabilities increased by 16 percent from 2012. Continue reading →
Top 5 network security mistakes & their simple solutions
IT resources in small and medium-size businesses are often limited and time savers are welcome. But some security short cuts may put your business at risk costing more than time in the long run. Here are five of the most common security mistakes SMB’s make and their simple solutions. Continue reading →
For the small to medium size businesses fighting to grow and make a profit automating everyday IT tasks is vital.
Even in larger organizations where IT teams are small and have a lot to do proactive threat management remains a low priority. That’s where automatic vulnerability and patch management comes in. Add deep network analysis and comprehensive risk assessment to the mix and you really have something of great value. Continue reading →
GFI LanGuard is a leading network security scanner and patch management solution that acts as a virtual security consultant. It gives you a complete picture of your network setup, provides risk analysis and helps you maintain a secure and compliant network with minimal effort. So how does LanGuard work?
GFI LanGuard 2014 R2 is a network vulnerability scanner, patch management, and network auditing tool. There are currently over 1,500,000 nodes with LanGuard deployed.In this article I will answer some of the most frequent questions I receive about licensing GF LanGuard.
Recently, a small bank in Wyoming with a 1 man IT department contracted a nasty computer virus that their antivirus did not catch. The virus caused a huge loss in production and new business.
Because their Big Name antivirus failed to detect the virus, the bank began looking for an alternative. How did this happen? Because today computer crackers (The Bad Guys) are exploiting third party applications such as Java, or Adobe Flash. Also there may be machines on the network with outdated antivirus definitions.
Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers. Continue reading →
April 8, 2014 has come and gone and you may be wondering what all the fuss was about. After all, the bad guys haven’t come out of hiding, wreaking havoc on those who still have instances of Windows XP running on their networks. Continue reading →