Latest posts

What’s the difference between WAN optimization and WAN acceleration?

This is a trick question! Technically, there is not a difference between WAN optimization and WAN acceleration. As a matter of fact, WAN acceleration is a type of WAN optimization. Now that we have cleared that up, we can now get into WAN optimization and what you can do to make the most out of your […]

Continue reading

September 2018 – Microsoft Patch Tuesday

Although summer isn’t officially over until later this month, it might as well be autumn already where I live. School has started, the swallows that nest in our eaves have left for South America, the weather has grown slightly cooler (and rainier), and the Atlantic is full of hurricanes (which I narrowly avoided by cruising […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading

30 network security Twitter feeds to follow

Twitter is where information is updated within seconds, especially in the information technology industry. Every day, tweets are sent out at up to 240 characters to share news and personal views as they happen. We have rounded up the top 30 sysadmin twitter accounts that you need to follow based on the number of followers […]

Continue reading

Consent is not enough (part 1): GDPR data security requirements

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […]

Continue reading

Last month’s top cybersecurity stories – August 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cyber security stories of August 2018. Fortnite app comes to Android, bringing multiple security worries Wildly popular shoot-em-up game, Fortnite, finally came to Android this month, […]

Continue reading

Nonprofits need IT security and communications software too

Nonprofit organizations do not follow a lot of the same rules as other businesses. They normally deal with grants, donations, and monies for other sources than themselves. Every nickel and dime has to be accounted for. Nonprofits have to make sure they can tell you which cause the money you donate will be helping. With […]

Continue reading

Third Party Patch Roundup – August 2018

Summer is almost at an end, and the months ahead are sure to be hectic as always as we sail toward the holiday season and the end of yet another year. Because those holidays also serve as a prime time for spammers, scammers, and attackers, it’s important to get ahead of the game and start […]

Continue reading

Kerio Connect serves up to the competition

Information travels at a mile a minute, or so they say. If your business is not using email, you might as well admit that you are working in the Stone Age and realize you are missing out on opportunities. News sources predict there will be 19 billion email users by 2019 worldwide. While your business […]

Continue reading

Webinar: Fight security threats and protect your devices

From the smallest of smart devices to the largest of servers, every piece of technology which is connected to the internet is exposed to the dangers of being hacked. Join our free webinar to learn how you can secure your network with the help of the GFI Software Security family.

Continue reading