Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

Email Archiving Doesn’t Have to be a DIY Project

The “do it yourself” craze is big, and there’s a good email-not-DIY-300x243reason for that. You can learn a lot, save money, and ensure that things get done your way. But there’s a down side, as well. The success (or not) of DIY depends on both the nature of the project itself and on the person(s) doing it. While DIY might be a great choice for minor home improvement projects such as putting up wallpaper or laying tile, it can turn into a disaster – or even turn deadly – when amateurs decide to tackle electrical work or knock down structural walls. And painting a mural on your wall might turn out great for a do-it-yourselfer with some artistic talent, whereas it might not end up so well for someone who has never had an aptitude for art.

Posted by

What’s New in GFI WebMonitor®

David Attard, Product Manager for GFI david-attard-300x199WebMonitor, talks about what’s new in GFI WebMonitor 2013.

Q: What’s special about the latest version of GFI WebMonitor?

A: We have enabled web filtering using agents in the latest version of GFI WebMonitor. Basically, a small version of the GFI WebMonitor server is installed on business assets such as laptops and notebooks. This enables the administrator to monitor and block web activity on assets that are not connected to the corporate network. A lot of employees have a company laptop that they take home with them or on their travels. Since these are company owned, we recommend that they are protected even when ‘roaming’, that is away from the office. The level of protection for company assets is the same with the GFI WebMonitor agent whether they are on the network or not.

Posted by

Is Your Email a Ticking Legal Timebomb?

A couple of months ago, I postulated here e-discovery-300x224that, far from being dead, email is alive and kicking in business organizations around the world. We talked about how to secure those messages from attackers, but that’s only part of the problem inherent in managing an email system. There’s another type of outsider to whom you might someday have to give access to all those internal communications: the legal system. Regulatory agencies can demand to audit your mail system, or courts can subpoena stored mail messages that are evidentiary in nature as part of the discovery process in the event of a lawsuit or criminal charges. That means you’d better have a good email archiving system in place. But what exactly are the characteristics of a good system?

Posted by

How to Protect Your Twitter Account from Targeted Phishing Attacks

The Syrian Electronic Army, a hacking collectivePhishing-Twitter-300x300 which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, the Guardian, E! The compromised accounts were then used to spread pro-Syrian government messages and even fake news – news which led to a temporary dip in the Dow Jones and huge $136 billion in value. The latest victim of this hacking spree has been the satirical news website “The Onion”. After taking these attacks with a pinch of salt and posting several satirical articles, The Onion has posted an article detailing how this was done.

Posted by

The Hidden Security Threat

Although not all stories in the tech press are IP-security-300x225directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.

The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.

Posted by

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.

Posted by

Survey: 81% of U.S. Employees Check their Work Mail outside Work Hours

GFI Software™ report reveals employees regularly read email during weddings, funerals and other family events

The conventional, 9 a.m. to 5 p.m., five-day work week is aEmployee-Checks-Work-Mail-from-home thing of the past for the overwhelming majority of workers at small to mid-sized businesses, according to a new survey on work-related email habits. Due to the widespread availability and use of smartphones and tablets, email is more accessible than ever and, as a result, it has become deeply embedded in the daily workplace and personal lives of most employees. The independent, blind survey of 503 employees in workplaces in the U.S. was conducted by Opinion Matters on behalf of GFI Software. The results highlight employee habits around email usage, including response frequency during the workday as well as after hours.

The new 24/7 paradigm

  • Based on the reported email habits of survey respondents, the line between work and home life has become blurred. More than three-quarters of respondents (81%) said they check their work email on weekends, 55% check email after 11 p.m. and 59% keep on top of their work email while on vacation.
  • Outside of regular work hours, more than six in 10 (64%) check email at least once a day. 12% of employees said they check work email in real time beyond the standard workday.
  • One in 10 respondents admitted to checking work email at a child’s school event, 9% at a wedding, and 6% at a funeral. An additional 6% said they logged into their work email while they or their spouse was in labor.
  • On the flip side, nearly one-third (30%) of employees also said they send personal emails from their work account.
Posted by

GFI EventsManager® Now Includes Proven Active Monitoring Functionality

GFI EventsManager, the company’s esm-logo21-300x173 award-winning log management software, now includes the established active network and server monitoring capabilities found in the company’s popular GFI NetworkServerMonitor®solution. This new functionality, combined with GFI EventsManager’s existing log management capabilities, gives IT administrators a holistic view of their infrastructure’s performance.

Posted by