Mind that password… again

Last week I commented on the phishing attack that resulted in more than 10,000 passwords being leaked online. An analysis of the passwords showed that many computer users are more concerned with choosing a password that they can remember rather than one that is strong and reduces the risk of it being hacked. Now a […]

Continue reading

Mind that password

The phishing attack that led to more than 10,000 Hotmail, MSN and Live.com passwords being exposed online earlier this week has provided an interesting glimpse into the mindset of email users when setting up their accounts. A researcher who managed to look at the 10,000 or so Hotmail, MSN and Live.com passwords published an analysis […]

Continue reading

Scareware on the increase

A report by the Antiphishing Working Group this week reveals that the number of people downloading and installing rogue anti-virus programs is on the rise with one security company claiming that cybercriminals were making up to $34 million a MONTH from gullible users. According to the findings, in the first quarter of 2009 alone, more […]

Continue reading

GFI Software acquires hosted email filtering company Katharion

We are pleased to announce the acquisition of Los Angeles-based hosted email filtering company Katharion. Through this acquisition, we will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. “This is the next step of our strategy to give our customers the option of having an email filtering product […]

Continue reading

GFI Software wins five Best Channel Product 2009 Awards

We are delighted and proud to have received five awards in the Best Channel Products Awards organized by Business Solutions Magazine. GFI rated exceptionally well in the Network Security category and very high in terms of ease of upgrade and VARs’ ability to service the product. The winning products are: GFI MailEssentials, GFI MailArchiver, GFI EndPointSecurity, GFI WebMonitor and GFI MAX , […]

Continue reading

People do reply to email spam

I sometimes wonder how spammers can be so successful in what they do. They send out millions of emails every day promising the world – get rich offers, a pile of cash waiting just for you to claim ownership, pills and creams that work wonders, financial advice and dozens of other schemes and offers. Junk, […]

Continue reading

Security policies: making them work for you – Part 2

In the first of this two part article, the discussion centered around the creation of IT security policies and why there often is strong resistance to their existence and implementation. Successfully implementing IT security polices goes beyond the technology and encompasses an understanding of organizational structures and workplace psychology. In the second part, I will […]

Continue reading

Security policies: making them work for you – Part 1

Every organization has its own rule book or set of procedures that management or HR expects employees to follow religiously. These ‘rules’ stipulate when employees are to start and finish work; when they can take their lunch break or how many days of leave they are entitled to, and so on. Bar the usual exceptions, […]

Continue reading

Security awareness: taking the first steps

In a previous post, I talked about the importance of security education and awareness programs for employees. If you are an IT administrator or a business owner reading this blog you may feel that in theory this is great and makes sense, but in real life, resources and time are precious commodities that could be used on […]

Continue reading

Security education: ineffective or the wrong approach?

Employees don’t give two hoots about security or security policies. They share passwords with colleagues; they share work devices with others without supervision; they transfer files from their laptop to home computer; they use their corporate email address to subscribe to non-work related newsletters / sites; and if their boss says they can’t do something, […]

Continue reading