Communications

5 things you need to know about email archiving before choosing a solution

According to Statista, in 2018 there were approx. 281 billion emails exchanged, including personal ones and in 2020 the number is expected to increase by 10%. In 2018, there were 128.8 billion business emails sent and received per day, according to Radicati.   Which are the laws that govern email archiving? This volume of email […]

Continue reading

The Governance/Compliance Relationship: Strategy and Tactics

We hear a lot about governance in relation to developing regulatory compliance processes and procedures, but do you really know what it is and the role it plays in achieving compliance with governmental and industry mandated IT security and privacy requirements? Governance, management, and compliance: similarities and differences The Cambridge dictionary defines governance as “the […]

Continue reading

California Consumer Privacy Act Looms Large

The U.S. doesn’t have a federal comprehensive privacy law like the European Union’s General Data Protection Regulation (GDPR), but the legislatures in individual states have been moving to fill in the gaps by passing their own statutes to provide privacy protections to their residents. California’s Consumer Privacy Act (the CCPA) is at the forefront of […]

Continue reading

GFI MailEssentials Multi-Server

GFI MailEssentials is a powerful and complete solution that provides anti-spam, anti-malware, and email security for on-premises mail servers. With its new multi-server feature, it became easier than ever to use and manage in large organizations. Let’s have a look at what this feature is and what it provides.   Multi-Server Feature Larger environments typically […]

Continue reading

Compliance Matters: Data identification and classification

Compliance is all about adhering to regulations established by governments and industries. The main focus of those regulations as they pertain to IT professionals can be summed up in one word: privacy.  Most of our compliance efforts are directed at protecting the privacy of personal identifiable data coming through our networks, stored on our systems, […]

Continue reading

Kerio Connect vs Microsoft Exchange

Organizations wishing to operate their own mail servers have a number of different mail server platforms that they can choose between. Two of the leading platforms available today are Microsoft Exchange Server 2019 and Kerio Connect from GFI Software. This article examines the similarities and differences between these two platforms. Organization Size Microsoft Exchange Server […]

Continue reading

Compliance in the cloud: It’s a team effort

Ensuring that your organization is compliant with a plethora of regulations that seem to change and grow on a daily basis is enough of a challenge when all your data is stored and processing is done in your on-premises data center, but when (mostly likely not “if”) you move some or all of your resources […]

Continue reading

Data privacy: The heart and soul of your compliance strategy

If you ask a group of IT professionals what regulatory compliance is all about, at least some of them are likely to answer “security.” It’s the way we think, because security is a technological mechanism and we are, after all, techies. If you ask members of the legal department what compliance is all about, at […]

Continue reading

Navigating the maze of regulatory compliance

Compliance Matters Navigating the maze of regulatory compliance Once upon a time, being an IT professional was relatively simple – and not just in terms of the technology itself. Today it’s a maze of complexity on several levels. This new monthly blog post will delve into the compliance issues that are facing IT today and […]

Continue reading

There’s still time to implement BYOD this year

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […]

Continue reading

Find us on Facebook

Follow us on Twitter