The IT network is secure, costs are down, end user service has improved and businesses are saving more IT time! Is that possible? The answer is a resounding yes. According to our latest survey, GFI Cloud customers in their majority have benefited from ALL the above.
So what changes have customers seen since implementing GFI Cloud?
First and foremost – 60 percent of respondents believe their IT network is now more secure, while 40 percent report security is ‘about the same’, indicating they had security solutions in place previously but moved to GFI Cloud for other reasons such as the convenience of working remotely across multiple sites. Continue reading →
The Business Computing Weekly Podcast Episode # 419
This episode, the focus of the podcast turns to keeping your network safe and protecting your data. The following are discussed.
1. Hackers Vs. Crackers. Threats come from many sources including your employees
2: Be careful of movie devices, and BYOD (Bring your Own Devices).
3. The ongoing battle of Zero Day attacks
4. 95.6% of mobile devices users put company data at risk by using public wifi
5. Reasons to develop a layered security approach
6 Crackers are taking advantage of social networks
7. The responsibility that comes with large amounts of storage
8. Keeping patch management front and center in your policies
9. Thoughts about “Shoulder Surfing”
10. 32% of IT Admins do not test their backup solutions
11. When employees of rogue. Stealth technologies in the workplace.
Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices. Continue reading →
Not everyone understands that network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base. Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are. Continue reading →
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.
Our seventh project suggestion was for spam filtering – here’s what we had to say:
Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate. Continue reading →
Administrators have a tough job on their hands to manage, maintain and protect the network they are responsible for. Armed with the latest tools, they do an excellent job; however, at times, often due to pressure, they make mistakes – sometimes easily avoidable. In this post we are going to present the top 43 common mistakes administrators have made, as a reminder of what they shouldn’t do.
They are categorized under networking, configuration, security, and best practices, and are based on firsthand experiences.
Here is the list:
1. Leave the trailing dot off a zone file in DNS
The first and most significant mistake a new BIND administrator can do is forget to end each zone with the trailing dot, leaving their zone dangling in the breeze as clients try to append their own domain name, and fail. Continue reading →
We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.
How do cracks work?
When hackers crack software, they modify the program’s code. Depending on the copy protection mechanics, the modification required can be as simple as changing one byte to something as complex as rewriting chunks of code. Before any of this can be done, a hacker will have to reverse engineer the software and understand how the copy protection mechanism works. This requires skill – more skill than that required to modify the software in order to defeat said copy protection. Why is this important? Someone who is capable of cracking software is probably also able to modify it in any way they see fit. This is where security risks come into play. Continue reading →
Have you ever been confronted by a decision that seemed so ill-advised or just plain wrong that you couldn’t believe anyone would make it? Has that been something either directly related to, or impacting security? If so, then there’s probably something on this list that will ring a bell and bring back ‘fond’ memories. We’re all human, we all make mistakes and, sometimes, we do that while thinking that what we are doing is in the best interest of all concerned, or mandated to us as policy; but what’s really happening is that we’re setting ourselves and others up for really bad things. This list can either be a stroll down memory lane or a warning to help you avoid what have to be some of the dumbest security decisions ever made.
Good intentions, bad executions
Our first set of security decisions come from admins or managers who, no matter how well intentioned they may have been, just didn’t think things through. I expect you’ll recognize all of these. Continue reading →