Latest posts

The real estate industry embraces IT software to get ahead

Selling a home or leasing a space is built on relationships. Any compromise of sensitive data could lead to big problems for both clients and the professionals that they trusted to keep their data safe.

Continue reading

August 2018 – Microsoft Patch Tuesday

Here we go again. It’s August 14, and after last month’s buggy patches – with numerous known issues, particularly regarding .NET, Windows 7 and 8.1 – it’s not surprising that many IT pros are feeling at least a little wary but what might be in store this time. There were enough problems that Woody Leonhard […]

Continue reading

Data security on premises and off

Keeping content safe no matter where it “lives.” We talk a lot about multi-layered security: perimeter security, network security, cloud security, device security – but what is it that we most need to protect?  The answer usually boils down to: the data.

Continue reading

Last month’s top cybersecurity stories – July 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cybersecurity stories of July 2018 which includes the new Microsoft bounty program, serious cyberattacks in Singapore and Reddit’s recent breach.

Continue reading

Scanning Open Ports in Windows: Part 3 (NMAP)

In 2012 and 2013, I wrote a couple of articles called Scanning Open Ports in Windows: A Quick Guide and Scanning Open Ports in Windows: A Quick Guide (Part 2) that covered how to use a series of neat little utilities to view open ports and troubleshoot client or server side application network connectivity issues. The articles […]

Continue reading

Third Party Patch Roundup – July 2018

Here we go again. Yes, it’s already the end of another month and time to round up the patches that have been issued in July by various software vendors.

Continue reading

Ensure your insurance business has the right IT software

Insurance is meant to mitigate a loss. Whether if it is a home, person, car, or health, very personal data is transferred between the agent, agency, and the insured.  The insurance industry is often used as an example for tight regulations at both the state and federal level. With all of the data leaks, ransomware, […]

Continue reading

JIGSAW changes its game to cryptojacking

An old friend has veered its ugly head. First mentioned on TechTalk in 2016, JIGSAW has made a reappearance with a few updated tweaks. This old form of ransomware has been altered to steal Bitcoin by changing the addresses of wallets and sending the payments to the hacker’s account. JIGSAW was infamous for appearing on computer […]

Continue reading

The top 20 free Network Monitoring and Analysis Tools for sysadmins

We know how administrators love free tools that make their life easier so here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing traffic on your network.

Continue reading

Keeping the healthcare industry safe with the right IT software

The hospital and healthcare industry met quite a few challenges involving ransomware in the last year. Learn how you can protect your business with different solutions at one low price per user with GFI Unlimited.

Continue reading