Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

Target’s tale: Lesson learned or will you be burned?

Written by: March Thaler

Turn back the clock to late last year. At the height of theshutterstock_125177096-300x255 holiday season, between November 27 and December 15, hackers certainly gave new meaning to the term “hit the bull’s-eye!”

Cybercriminals toyed with retail giant Target, known for the circular red and white logo that symbolizes its name. Information from 40 million guest debit and credit card accounts was stolen – or so it was thought. The initial estimate, already among the largest in U.S. corporate history, turned out to be a fraction of the total. Today, it ranges from 70 million to 110 million, depending on reports.

Posted by

Patching and antivirus tips every sys admin should know

Jenny Duncan on March 19, 2014

When you started out in IT, did you really want to spend allshutterstock_126121670-300x300 your life applying patches to PCs and checking if the antivirus product installed is up to date and working properly? Let’s be honest, these tasks get a little repetitive and monotonous, but if you drop the ball with either of these jobs, your IT department (and you) could end up in hot water. Taking shortcuts on patching and antivirus should never be an option.

Posted by

GFI EventsManager Licensing Explained

This article explains the two different versions of GFI EventsManager, and how it is licensed. Unfortunately GFI doesn’t break them down on its website, and thus creates some confusion to potential customers.

EventsManager Complete:

Formerly GFI EventsManager for Servers, GFI recently added an active monitoring component to the software. This is similar to GFI Network Monitor and adds the ability to monitor services, CPU utilization, hard drive space and more. This version also allows to you to manage event logs from Windows Servers, W3C logs and Sys logs from network devices such as Cisco routers and switchers. You are not able to manage logs from computers running Microsoft Windows (workstations) this product is licensed per node.

Posted by

Monitoring logons in Windows environments

Tom Merritt joins us as our guest this week. Tom started his broadcasting career at WGEL Radio in Illinois in 1986. After working in Radio for a number of years, Tom began to focus on technology. Tom joined the cast at Tech TV and began producing programming mixing the web and television. He then moved to Cnet, and worked on creating the popular Buzz Out Loud podcast. Tom also worked with Leo Laporte’s TWiT network. Tom currently is an independent journalist, and is working hard to build his brand.

Posted by

What’s New in GFI MailArchiver® 2013 R2

By: Christina Goggi

GFI MailArchiver archives more thanMAR-Team2-300x159 just your email. Following last year’s addition of simple file archiving, the GFI MailArchiver team is introducing archiving of calendar items and meeting requests. Product manager Ian Bugeja tells us a bit more about the latest features.

Ian, why calendar archiving?

Everybody uses the Calendar feature to schedule and arrange meetings and their diary for the day. In many companies, meetings are set and scheduled using meeting requests, and these are basically emails too. So the only logical location to store similar items for future reference is the archive. GFI MailArchiver is a powerful email archiving solution and calendar archiving is something our customers asked for… so here we are.

Posted by

Telecommuting: Is it the Wave of the Future or On the Way Out?

By: Debra Littlejohn Shinder

I’ve been working from home for over 15 years nowTelecommuting-300x200 – but then, I’m a self-employed sole proprietor.  Most of the people I know work for small/medium businesses, corporations or government entities. For a long time, I was the envy of all those friends and relatives who had to get all dressed up and fight traffic to make it to their workplaces on time every day. However, over the past several years, more and more of them have joined me in the ranks of “home workers” – without giving up their jobs and venturing out on their own.

Posted by

Email Security in a Corporate or Small Business Environment

Written by: Bruce Naylor November 4th 2013

Cyber attacks against small businessGFI_Logo establishments as well as corporations are very common and many small business firms find it difficult to bear the financial loss created by such attacks. It has become all the more necessary to adopt effective steps at workplaces to ensure security of the computers. Many companies introduced training programs for the employees on how to ensure digital security. As the first step the employees are trained how to avoid spam as well as the attachments of the spam messages, how to avoid outside instant messaging clients etc. Improper and ineffective uses of E-mail through the company’s computers in many places have led to litigation in many cases. E-mail manners are quite essential for smooth running of a business.

Posted by