Recently I had the opportunity to participate in a GFI case study for the popular GFI FaxMaker software. Last Tuesday March 10th 2015, a video production company visited me in my home office to record the case study. They carried with them a ton of lighting and state of the art video gear.
For those of you unfamiliar with the term “case study” here is the best way to explain it. A case study is an examination of how a customer uses a product, and how the product benefits their business, and or improves their business processes. Continue reading →
Unsolicited email or spam may be a mere nuisance for most emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email. Continue reading →
Email is by far the number one way networks are compromised and the main route for data leakage. Fortunately there are some simple ways to safeguard this vital asset and the resources your email connects to.
1. Proper passwords
Too many email accounts are protected by passwords weaker than a Tour de France racer’s bicep. Simple passwords are simple to remember – so left to their own devices, that is what end users tend to choose. Continue reading →
There’s a new beast in town and if you’re one of the unlucky folks to cross its path, then you’re either a few hundred dollars poorer or you’re stuck with a hard drive (or more) with encrypted data that you can’t retrieve (unless you have backups).
The CryptoLocker Virus is a nasty piece of malware doing the rounds that encrypts files on a victim’s computer and issues an ultimatum: Pay up or lose your data. CryptoLocker’s raison d’être is to literally extract a ransom from its victims, which is why malware of its type is also known as “ransomware”. Continue reading →
Cyber attacks against small business establishments as well as corporations are very common and many small business firms find it difficult to bear the financial loss created by such attacks. It has become all the more necessary to adopt effective steps at workplaces to ensure security of the computers. Many companies introduced training programs for the employees on how to ensure digital security. As the first step the employees are trained how to avoid spam as well as the attachments of the spam messages, how to avoid outside instant messaging clients etc. Improper and ineffective uses of E-mail through the company’s computers in many places have led to litigationin many cases. E-mail manners are quite essential for smooth running of a business. Continue reading →
The “do it yourself” craze is big, and there’s a good reason for that. You can learn a lot, save money, and ensure that things get done your way. But there’s a down side, as well. The success (or not) of DIY depends on both the nature of the project itself and on the person(s) doing it. While DIY might be a great choice for minor home improvement projects such as putting up wallpaper or laying tile, it can turn into a disaster – or even turn deadly – when amateurs decide to tackle electrical work or knock down structural walls. And painting a mural on your wall might turn out great for a do-it-yourselfer with some artistic talent, whereas it might not end up so well for someone who has never had an aptitude for art. Continue reading →
GFI Software™ report reveals employees regularly read email during weddings, funerals and other family events
The conventional, 9 a.m. to 5 p.m., five-day work week is a thing of the past for the overwhelming majority of workers at small to mid-sized businesses, according to a new survey on work-related email habits. Due to the widespread availability and use of smartphones and tablets, email is more accessible than ever and, as a result, it has become deeply embedded in the daily workplace and personal lives of most employees. The independent, blind survey of 503 employees in workplaces in the U.S. was conducted by Opinion Matters on behalf of GFI Software. The results highlight employee habits around email usage, including response frequency during the workday as well as after hours.
The new 24/7 paradigm
Based on the reported email habits of survey respondents, the line between work and home life has become blurred. More than three-quarters of respondents (81%) said they check their work email on weekends, 55% check email after 11 p.m. and 59% keep on top of their work email while on vacation.
Outside of regular work hours, more than six in 10 (64%) check email at least once a day. 12% of employees said they check work email in real time beyond the standard workday.
One in 10 respondents admitted to checking work email at a child’s school event, 9% at a wedding, and 6% at a funeral. An additional 6% said they logged into their work email while they or their spouse was in labor.
On the flip side, nearly one-third (30%) of employees also said they send personal emails from their work account.
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.
Our seventh project suggestion was for spam filtering – here’s what we had to say:
Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate. Continue reading →
Google sounded the death knell of Postini when it started releasing similar features natively within Google Apps. Now Google has announced the end of Postini. This has presented a very real problem for 26 million Postini users – who can either pay more in the long run and use Google Apps, or move to another service to get what they need and avoiding paying for what they don’t.
While cloud-based email protection has brought many advantages to business, migrating from one provider to another can pose challenges. The Google product forums about the difference in services offered by Google may well be cause for concern for current customers. Continue reading →