Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

The Hidden Security Threat

Although not all stories in the tech press are IP-security-300x225directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.

The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.

Posted by

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.

Posted by

GFI EventsManager® Now Includes Proven Active Monitoring Functionality

GFI EventsManager, the company’s esm-logo21-300x173 award-winning log management software, now includes the established active network and server monitoring capabilities found in the company’s popular GFI NetworkServerMonitor®solution. This new functionality, combined with GFI EventsManager’s existing log management capabilities, gives IT administrators a holistic view of their infrastructure’s performance.

Posted by