Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

Analyzing Email Communications Part 1

Written by: Christina Goggi When it comes to corporate email, IT administrators have quite a challenge. They need to find the right balance between protecting employee privacy and monitoring electronic communications for signs of bad behavior. Likewise, employees have to respect the company’s rules for communicating, and use good judgment when sending and receiving emails. This can…

Posted by

Internet Access – Serious Business in Dangerous Times [Free eBook]

Written by: Christina Goggi

Do you know just how dangerous the Internet is? Have you been scared WebMonitor_EBook_340x340-2-300x300(or even scarred) by enormous charges from your Internet Service Provider for bandwidth usage? Are you trying to figure out why so many of your users seem to be busy all the time, but never get anything done? Have you dealt with complaints from the business or customers about how slow the website is, or why does it take so long to send or receive an email? If you can answer yes to even one of those questions, we may have the answer for you in their latest eBook, The Most Dangerous Sites on the Internet!

Posted by

Bring Your Own Device Without Worry Thanks to GFI LanGuard®

Written by: Christina Goggi

One of the big buzz words in IT for the past severalBYOD-devices-300x300 years has been BYOD (Bring Your Own Device). BYOD scenarios are starting to crop up everywhere, from small businesses all the way up to federal government agencies. One of the biggest challenges SysAdmins, security professionals and CIOs all face is how to secure these devices.

One trend that is growing in popularity involves the approach of “securing the data, not the device”. While that sounds great and should definitely be a part of your security strategy, if you think you can get away with securing your data while ignoring all those devices, you are only a breaking news story away from a very embarrassing situation. Defense in-depth strategies require you to secure more than just the data, and the devices your users use are a key component, whether you paid for them or they did.

Posted by

The Key to Boosting Office Morale Is… Email Archiving?

Written by: Marc Thaler

Are you engaged?

The question could rank among the all-time worst pick-upHappiness-300x300 lines. But in this context, it has nothing to do with your dating life. It has everything to do with your professional life – specifically how happy (or unhappy) your job makes you feel.

In June, Gallup released its 2013 State of the American Workplace. The survey revealed that just 30% of U.S. workers (approximately 30 million people) are “engaged” employees. They are passionate about their jobs and feel connected to the company that employs them.

Posted by

How Much Does Facebook Cost You Each Month?

Written by: Christina Goggi on October 8, 2013

Nobody wants to be a buzzkill, and the Facebook-costs-300x201owners and management of small to mid-sized businesses probably have a couple of dozen more important things to do at any one point in time than to police their employees’ Internet usage. But have you ever stopped to consider just how much does Facebook cost you each month? Whether you pay a fixed monthly fee for bandwidth or a variable cost depending upon usage, it’s not just bandwidth that we’re talking about. Facebook and other non-business uses of the company’s Internet connectivity can add up quickly and cost you far more than you ever realized, impacting productivity and morale to bandwidth utilization. Let’s look at each one in a bit more detail.

Posted by

Porn in Parliament – Also in Your Office?

It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to onlineporn adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, official figures released under the Freedom of Information Act show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.

Why does this happen

It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge

Posted by

Are You Ready for 2014? GFI LanGuard® 2014 Is!

We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release.

Q: How is GFI LanGuard adapting to the changes that happen so fast in the IT infrastructure landscape nowadays?

Cristian Florian, Product Manager for GFI LanGuardCristian-Florian

IT environments now include so many different devices, operating systems and applications that network administrators may not even be aware of all of them. The rise in BYOD (Bring Your Own Device) in business environments has added to the burden system administrators have to carry every day, in turn forcing them to stay on top of their network environment, strengthen security, while also monitoring an ever-changing network infrastructure.

Posted by

Hackers Find the Internet a Target-Rich Environment Thanks to Poor Patch Management

You would think that with things like automatic updates, applicationshackers-poor-patch-management that can automatically patch themselves, and the constant media attention towards security, hackers would be a dying breed, bereft of targets which they can exploit. Unfortunately, poor patch management practices across the board means that the ever-growing number of connected devices are providing hackers with and endless supply of fresh victims.

Posted by

The Problem with Patching Is – Not Patching!

running-patch-management-300x200

Patching is not something that the IT department really enjoys doing. It is complicated and ongoing. It takes forever and it doesn’t add any actual business value.

Meanwhile you have myriad systems to patch, and endless patches to test and then install. Then you have to do it all over again. And again. And again.

No wonder a recent study by the UK-based Federation of Small Business shows that little more than a third (36%) of small shops patch regularly. Then these shops wonder why they got compromised, or blame their software vendors, especially Microsoft® – a common security punching bag!

Patching, well, patching properly, solves the majority of security problems. In fact 90% of successful exploits are against unpatched systems.

Even environments that should presumably be highly secure too often fail to patch. Last year an audit at the U.S. Department of Energy found that some 60% of their desktops lacked important patches.

Posted by