The IT network is secure, costs are down, end user service has improved and businesses are saving more IT time! Is that possible? The answer is a resounding yes. According to our latest survey, GFI Cloud customers in their majority have benefited from ALL the above.
So what changes have customers seen since implementing GFI Cloud?
First and foremost – 60 percent of respondents believe their IT network is now more secure, while 40 percent report security is ‘about the same’, indicating they had security solutions in place previously but moved to GFI Cloud for other reasons such as the convenience of working remotely across multiple sites. Continue reading →
Do you know just how dangerous the Internet is? Have you been scared (or even scarred) by enormous charges from your Internet Service Provider for bandwidth usage? Are you trying to figure out why so many of your users seem to be busy all the time, but never get anything done? Have you dealt with complaints from the business or customers about how slow the website is, or why does it take so long to send or receive an email? If you can answer yes to even one of those questions, we may have the answer for you in their latest eBook, The Most Dangerous Sites on the Internet! Continue reading →
Nobody wants to be a buzzkill, and the owners and management of small to mid-sized businesses probably have a couple of dozen more important things to do at any one point in time than to police their employees’ Internet usage. But have you ever stopped to consider just how much does Facebook cost you each month? Whether you pay a fixed monthly fee for bandwidth or a variable cost depending upon usage, it’s not just bandwidth that we’re talking about. Facebook and other non-business uses of the company’s Internet connectivity can add up quickly and cost you far more than you ever realized, impacting productivity and morale to bandwidth utilization. Let’s look at each one in a bit more detail. Continue reading →
It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, official figures released under the Freedom of Information Act show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.
Why does this happen
It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge Continue reading →
Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices. Continue reading →
A: We have enabled web filtering using agents in the latest version of GFI WebMonitor. Basically, a small version of the GFI WebMonitor server is installed on business assets such as laptops and notebooks. This enables the administrator to monitor and block web activity on assets that are not connected to the corporate network. A lot of employees have a company laptop that they take home with them or on their travels. Since these are company owned, we recommend that they are protected even when ‘roaming’, that is away from the office. The level of protection for company assets is the same with the GFI WebMonitor agent whether they are on the network or not. Continue reading →
GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go. Continue reading →
When Tim Berners-Lee first conceived of a system of interlinked documents that could be accessed over a world-wide network, nobody could have foreseen what a tangled Web we would weave. Today’s web is an amazing source of information and entertainment. It can be an invaluable resource for workers, helping them to ferret out facts, get step-by-step instructions, and resolve questions in minutes instead of the hours or days the same task might have taken thirty years ago. Continue reading →
“The Dirty Dozen″ are some of the worst and most common IT security mistakes that are easy to avoid. Some of them may seem like simple or common practice steps, but all too often they are forgotten or just disregarded. Here are “The Dirty Dozen″ and how you can avoid or correct them.
When Tim Berners-Lee first conceived of a system of interlinked documents that could be accessed over a world-wide network, nobody could have foreseen what a tangled Web we would weave. Today’s web is an amazing source of information and entertainment. It can be an invaluable resource for workers, helping them to ferret out facts, get step-by-step instructions, and resolve questions in minutes instead of the hours or days the same task might have taken thirty years ago.
However, as with any powerful tool, there’s a down side to putting this capability into the hands of employees who are, after all, subject to the all-too-human tendency to sometimes put pleasure ahead of work. An Internet-connected web browser opens the door to all sorts of temptations and distractions that can wreak havoc on productivity in the workplace. Continue reading →