Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

Keeping Customer Credit Card Data Safe With PCI-DSS

What is PCI-DSS? It stands for Payment Card Industry Data Security Standard. PCI-DSS applies to all business that accepts credit card information, stores credit card information , or any information about the cardholder. Yes, even Mom and Pop operations fall under PCI-DSS regulations.

What is good to know that there are 4 different levels that can apply to you. Almost everyone stats off at level 4 if you process less than 20,000 transactions per year. The more transactions your company does, the higher your level will rise. At bare minimum as a level 4 merchant or company, you must complete a Self Assessment Questionnaire, and may have to pass a can of your network by a A.S.V. (Approved Scanning Vendor)

Posted by

What’s new in GFI WebMonitor 2015?

GFIWebMonitor2015_SQThe Internet is a world of information and opportunity. Every business knows that. What not all businesses realize is that the Internet can be a nasty piece of work with cybercriminals all too happy to pounce on unprotected networks. Monitoring, managing and securing a business network is a must today.  Product manager, Calin Ghibu explains why the latest version of GFI WebMonitor is the next generation of web security software for businesses and what’s so special about this release.

Posted by

20 things that could happen when there’s no web monitoring software

WorstThatCouldHappen_SQNobody wants to be the Internet Police. We’re probably all very happy with unrestricted Internet access, and it’s none of our business what other people do online.

That all changes in a business environment. Since the company’s PCs are company assets, the company pays for bandwidth, and there are all sorts of threats out there even for users who are doing the right things, companies need Internet monitoring and filtering. It has nothing to do with policing the Internet but it has everything to do with safeguarding your network, assets, investment and reputation.

Posted by

Block harmful websites or else…

BlockHarmfulWebsites_SQMost companies these days provide Internet access to their employees. Most employees consider Internet access like coffee service – something that they take for granted. While this is a great thing for both employers and employees to have, when that Internet access is completely unrestricted, bad things can happen with alarming frequency. Companies’ IT or security teams need to implement technical protections to block harmful websites, or employees can quickly find their workstations compromised by malware. Let’s first discuss why you would want to block harmful websites, and then how.

Posted by

Improving productivity with Internet monitoring software

InternetMonitoring_SQThe Internet is one of the best and most powerful information tools but it can be an enormous time sink if employees in the company have unrestricted Internet access. When those constantly on Facebook, Tumblr, Reddit and the rest are on the clock, that’s time and money they are taking away from the business! Providing users unrestricted Internet access is great, but not when it causes productivity issues. One way to deal with the problem is to manage and monitor access to the Internet so that you are efficiently using bandwidth, maintaining productivity and keeping employees happy.

Posted by

The latest updates from the GFI Cloud team

CloudRemoteAdministration_SQElad Schreiber, Product Manager for GFI Cloud, talks about the latest release and the addition of remote administration tools to the Monitoring feature.

Q: Tell us about the latest GFI Cloud release?

This release sees further enhancements to GFI Cloud’s Monitoring service with the introduction of a set of remote administration tools.  Command Line, Process Manager and PowerShell command line will be familiar tools for most of our customers, and by incorporating these into the GFI Cloud platform they will now be able to use these tools remotely, from the same online console as the rest of their GFI Cloud services.

Posted by

The Problem with Patching Is – Not Patching!

running-patch-management-300x200

Patching is not something that the IT department really enjoys doing. It is complicated and ongoing. It takes forever and it doesn’t add any actual business value.

Meanwhile you have myriad systems to patch, and endless patches to test and then install. Then you have to do it all over again. And again. And again.

No wonder a recent study by the UK-based Federation of Small Business shows that little more than a third (36%) of small shops patch regularly. Then these shops wonder why they got compromised, or blame their software vendors, especially Microsoft® – a common security punching bag!

Patching, well, patching properly, solves the majority of security problems. In fact 90% of successful exploits are against unpatched systems.

Even environments that should presumably be highly secure too often fail to patch. Last year an audit at the U.S. Department of Energy found that some 60% of their desktops lacked important patches.

Posted by

Patch management: Fixing vulnerabilities before they are exploited

Introduction

Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis.

While software updates serve many important roles, be it delivering feature improvements or fixing bugs and security vulnerabilities, they bring with them a number of potential challenges for the IT Department in terms of ensuring systems are up-to-date, that new problems are not introduced by patches designed to fix things, and updates do not create compatibility or instability issues. All this needs to be done while ensuring that updates are pushed to PCs as quickly as possible to prevent vulnerabilities being exploited. The constantly evolving software landscape makes patch management an important consideration for all IT decision makers,regardless of organization size.

Posted by