What’s the difference between WAN optimization and WAN acceleration?

This is a trick question! Technically, there is not a difference between WAN optimization and WAN acceleration. As a matter of fact, WAN acceleration is a type of WAN optimization. Now that we have cleared that up, we can now get into WAN optimization and what you can do to make the most out of your […]

Continue reading

30 network security Twitter feeds to follow

Twitter is where information is updated within seconds, especially in the information technology industry. Every day, tweets are sent out at up to 240 characters to share news and personal views as they happen. We have rounded up the top 30 sysadmin twitter accounts that you need to follow based on the number of followers […]

Continue reading

Nonprofits need IT security and communications software too

Nonprofit organizations do not follow a lot of the same rules as other businesses. They normally deal with grants, donations, and monies for other sources than themselves. Every nickel and dime has to be accounted for. Nonprofits have to make sure they can tell you which cause the money you donate will be helping. With […]

Continue reading

Kerio Connect serves up to the competition

Information travels at a mile a minute, or so they say. If your business is not using email, you might as well admit that you are working in the Stone Age and realize you are missing out on opportunities. News sources predict there will be 19 billion email users by 2019 worldwide. While your business […]

Continue reading

The real estate industry embraces IT software to get ahead

Selling a home or leasing a space is built on relationships. Any compromise of sensitive data could lead to big problems for both clients and the professionals that they trusted to keep their data safe.

Continue reading

Defending your business from a SamSam ransomware attack

SamSam ransomware is not like any other. Last Tuesday, Sophos released an extensive report about how this meticulous malware sneaks up on unsuspecting victims and infiltrates their systems.  Since 2015, SamSam creators have earned USD 5.9 million, and that number continues to rise.

Continue reading

Ensure your insurance business has the right IT software

Insurance is meant to mitigate a loss. Whether if it is a home, person, car, or health, very personal data is transferred between the agent, agency, and the insured.  The insurance industry is often used as an example for tight regulations at both the state and federal level. With all of the data leaks, ransomware, […]

Continue reading

JIGSAW changes its game to cryptojacking

An old friend has veered its ugly head. First mentioned on TechTalk in 2016, JIGSAW has made a reappearance with a few updated tweaks. This old form of ransomware has been altered to steal Bitcoin by changing the addresses of wallets and sending the payments to the hacker’s account. JIGSAW was infamous for appearing on computer […]

Continue reading

Keeping the healthcare industry safe with the right IT software

The hospital and healthcare industry met quite a few challenges involving ransomware in the last year. Learn how you can protect your business with different solutions at one low price per user with GFI Unlimited.

Continue reading

Unlimited possibilities with GFI Software

Unleashing the power of GFI Unlimited was exciting last week as GFI Software welcomed established distribution partners from around the world to beautiful Scalaria, St. Wolfgang im Salzkammergut in Austria to take a closer look at the growing GFI Unlimited software library of network security and communications solutions.

Continue reading