Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

5 Reasons Behind Data Breaches and Cybercrime

JP Morgan, Home Depot,Target, Kaiser Health,Adobe All Big Data Breaches

My day job is a partner of GFI Software, Each day I speak to IT admins form very small to very large companies in North America, My focus is on Patch Management, Network Vulnerability Scanning,Windows Event Log Management, Securing network endpoints, W3C log management, as well as web security and email security.

Posted by

12 email tips to share with your users

Unsolicited email or spam may be a mere nuisance for most anti-spam-300x300emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email.

Posted by

10 BYOD policy guidelines for a secure work environment

Bring your own device (BYOD) is no longer simply a buzzword BYOD-300x256or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.

Posted by

A tale of two security approaches – and why you need both

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers.

Posted by

How Much Does Facebook Cost You Each Month?

Written by: Christina Goggi on October 8, 2013

Nobody wants to be a buzzkill, and the Facebook-costs-300x201owners and management of small to mid-sized businesses probably have a couple of dozen more important things to do at any one point in time than to police their employees’ Internet usage. But have you ever stopped to consider just how much does Facebook cost you each month? Whether you pay a fixed monthly fee for bandwidth or a variable cost depending upon usage, it’s not just bandwidth that we’re talking about. Facebook and other non-business uses of the company’s Internet connectivity can add up quickly and cost you far more than you ever realized, impacting productivity and morale to bandwidth utilization. Let’s look at each one in a bit more detail.

Posted by

The Hidden Security Threat

Although not all stories in the tech press are IP-security-300x225directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.

The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.

Posted by

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.

Posted by