Fax 3.0: This is Not Your Father’s Facsimile Machine

Some of my younger friends may not have ever encountered an old-fashioned fax machine, but I remember them well. There was a time when it seemed nothing short of a miracle to feed a document into it and have someone hundreds of miles away instantly receive it – or at least, a reasonable facsimile of […]

Continue reading

Taming a Web Gone Wild

When Tim Berners-Lee first conceived of a system of interlinked documents that could be accessed over a world-wide network, nobody could have foreseen what a tangled Web we would weave. Today’s web is an amazing source of information and entertainment. It can be an invaluable resource for workers, helping them to ferret out facts, get […]

Continue reading

Removable Storage: A Convenient Truth

Removable storage devices offer a big convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card or drive also makes it easy for employees (or anyone else who can gain physical […]

Continue reading

Is Your Email a Ticking Legal Timebomb?

A couple of months ago, I postulated here that, far from being dead, email is alive and kicking in business organizations around the world. We talked about how to secure those messages from attackers, but that’s only part of the problem inherent in managing an email system. There’s another type of outsider to whom you […]

Continue reading

Patch Mismanagement: Recipe for Disaster

You know how important it is to keep all the systems on your network updated – you’ve certainly been told often enough. And if you operate in a regulated industry, it’s not just a good idea – it’s a requirement. Part of the compliance process includes being able to show that systems have all necessary security updates […]

Continue reading

The Cloud Is not a “Get out of Jail Free” Card

Slowly but surely, many IT professionals have gotten past the initial fear and anger (which was based on the idea that the Cloud would drastically change or even eliminate their jobs). They are not only accepting the move to the cloud, but looking at it as a way to offload some of their responsibilities, especially […]

Continue reading

Email: The Reports of Its Death Have Been Greatly Exaggerated

The current consensus among the “cool crowd” of tech pundits seems to be that email is dead. Instant messaging and social networking have supposedly made it obsolete. They’ll tell you that business is moving toward a more “real time” model of communication, and now that even small businesses have easy access to video conferencing, the […]

Continue reading

Introducing – GFI Labs

GFI Labs Blog, the research and information security news hub of GFI Software, is now part of the GFI domain. Formerly known as the Sunbelt Labs Blog, it is one of the industry’s go-to portals for security enthusiasts and IT users looking for the latest news on online threats, social engineering ploys, and noteworthy scams. […]

Continue reading

How IT Can Rise Above the Mobility Wave

We don’t need studies and surveys to confirm what is evident in a growing number of business environments today: more and more employees are using their personal smartphones for work; the line between personal and office use is becoming ever so blurred. The era of the ‘mobile employee’ is here whether people accept it or […]

Continue reading

The Art of Social Engineering

Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a link within the email. The following day, we received another email with details of the […]

Continue reading