The “do it yourself” craze is big, and there’s a good reason for that. You can learn a lot, save money, and ensure that things get done your way. But there’s a down side, as well. The success (or not) of DIY depends on both the nature of the project itself and on the person(s) doing it. While DIY might be a great choice for minor home improvement projects such as putting up wallpaper or laying tile, it can turn into a disaster – or even turn deadly – when amateurs decide to tackle electrical work or knock down structural walls. And painting a mural on your wall might turn out great for a do-it-yourselfer with some artistic talent, whereas it might not end up so well for someone who has never had an aptitude for art.
Q: What’s special about the latest version of GFI WebMonitor?
A: We have enabled web filtering using agents in the latest version of GFI WebMonitor. Basically, a small version of the GFI WebMonitor server is installed on business assets such as laptops and notebooks. This enables the administrator to monitor and block web activity on assets that are not connected to the corporate network. A lot of employees have a company laptop that they take home with them or on their travels. Since these are company owned, we recommend that they are protected even when ‘roaming’, that is away from the office. The level of protection for company assets is the same with the GFI WebMonitor agent whether they are on the network or not.
A couple of months ago, I postulated here that, far from being dead, email is alive and kicking in business organizations around the world. We talked about how to secure those messages from attackers, but that’s only part of the problem inherent in managing an email system. There’s another type of outsider to whom you might someday have to give access to all those internal communications: the legal system. Regulatory agencies can demand to audit your mail system, or courts can subpoena stored mail messages that are evidentiary in nature as part of the discovery process in the event of a lawsuit or criminal charges. That means you’d better have a good email archiving system in place. But what exactly are the characteristics of a good system?
The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, the Guardian, E! The compromised accounts were then used to spread pro-Syrian government messages and even fake news – news which led to a temporary dip in the Dow Jones and huge $136 billion in value. The latest victim of this hacking spree has been the satirical news website “The Onion”. After taking these attacks with a pinch of salt and posting several satirical articles, The Onion has posted an article detailing how this was done.
Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.
The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.
Not everyone understands that network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base. Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.
GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go.
GFI Software™ report reveals employees regularly read email during weddings, funerals and other family events
The conventional, 9 a.m. to 5 p.m., five-day work week is a thing of the past for the overwhelming majority of workers at small to mid-sized businesses, according to a new survey on work-related email habits. Due to the widespread availability and use of smartphones and tablets, email is more accessible than ever and, as a result, it has become deeply embedded in the daily workplace and personal lives of most employees. The independent, blind survey of 503 employees in workplaces in the U.S. was conducted by Opinion Matters on behalf of GFI Software. The results highlight employee habits around email usage, including response frequency during the workday as well as after hours.
The new 24/7 paradigm
- Based on the reported email habits of survey respondents, the line between work and home life has become blurred. More than three-quarters of respondents (81%) said they check their work email on weekends, 55% check email after 11 p.m. and 59% keep on top of their work email while on vacation.
- Outside of regular work hours, more than six in 10 (64%) check email at least once a day. 12% of employees said they check work email in real time beyond the standard workday.
- One in 10 respondents admitted to checking work email at a child’s school event, 9% at a wedding, and 6% at a funeral. An additional 6% said they logged into their work email while they or their spouse was in labor.
- On the flip side, nearly one-third (30%) of employees also said they send personal emails from their work account.
GFI EventsManager, the company’s award-winning log management software, now includes the established active network and server monitoring capabilities found in the company’s popular GFI NetworkServerMonitor®solution. This new functionality, combined with GFI EventsManager’s existing log management capabilities, gives IT administrators a holistic view of their infrastructure’s performance.