Network

Page 2

Is your network bandwidth used properly?

Is your network bandwidth used properly? Nowadays we hear a lot “I don’t know why it’s taking so long to load the webpage”, “what’s happening to my connection” and the list can be infinite. In most cases, when users complain that their network is slow, there is a high chance the network bandwidth is overloaded. […]

Continue reading

There’s still time to implement BYOD this year

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […]

Continue reading

GFI Unlimited: Changing the SMB Channel Landscape

With unlimited product installations, free technical support, all for one flat-fee, it’s easy to spot the customer benefits of GFI Unlimited. But did you know, GFI Unlimited offers partners an innovative way to sell software, away from the usual constraints of managing different licenses for different products? We caught up with Johannes Kamleitner, SVP & […]

Continue reading

What’s the difference between WAN optimization and WAN acceleration?

This is a trick question! Technically, there is not a difference between WAN optimization and WAN acceleration. As a matter of fact, WAN acceleration is a type of WAN optimization. Now that we have cleared that up, we can now get into WAN optimization and what you can do to make the most out of your […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading

30 network security Twitter feeds to follow

Twitter is where information is updated within seconds, especially in the information technology industry. Every day, tweets are sent out at up to 240 characters to share news and personal views as they happen. We have rounded up the top 30 sysadmin twitter accounts that you need to follow based on the number of followers […]

Continue reading

Last month’s top cybersecurity stories – August 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cyber security stories of August 2018. Fortnite app comes to Android, bringing multiple security worries Wildly popular shoot-em-up game, Fortnite, finally came to Android this month, […]

Continue reading

Kerio Connect serves up to the competition

Information travels at a mile a minute, or so they say. If your business is not using email, you might as well admit that you are working in the Stone Age and realize you are missing out on opportunities. News sources predict there will be 19 billion email users by 2019 worldwide. While your business […]

Continue reading

Ensure your insurance business has the right IT software

Insurance is meant to mitigate a loss. Whether if it is a home, person, car, or health, very personal data is transferred between the agent, agency, and the insured.  The insurance industry is often used as an example for tight regulations at both the state and federal level. With all of the data leaks, ransomware, […]

Continue reading

JIGSAW changes its game to cryptojacking

An old friend has veered its ugly head. First mentioned on TechTalk in 2016, JIGSAW has made a reappearance with a few updated tweaks. This old form of ransomware has been altered to steal Bitcoin by changing the addresses of wallets and sending the payments to the hacker’s account. JIGSAW was infamous for appearing on computer […]

Continue reading

Find us on Facebook

Follow us on Twitter