Latest posts

Page 2

Kerio Control upgrades VPN encryption

In today’s world of constant threats, data at rest isn’t the only data that needs to be protected with encryption. With the amount of data traversing the internet, the encryption of data in transit is just as important. Whether internet traffic or VPN traffic, data protection is crucial. Kerio Control VPN has always done a […]

Continue reading

Data Held Hostage: The Ransomware Epidemic

Ransomware has been a constant cyberthreat since the early 2000s, although the first acknowledged instance was as early as 1989 when a file-encrypting Trojan was distributed on compromised diskettes, coupled with demands for a $189 payment. If you thought ransomware was a threat that only impacts technophobic grandmothers, reckless teenagers, and other home computer users, […]

Continue reading

California Consumer Privacy Act Looms Large

The U.S. doesn’t have a federal comprehensive privacy law like the European Union’s General Data Protection Regulation (GDPR), but the legislatures in individual states have been moving to fill in the gaps by passing their own statutes to provide privacy protections to their residents. California’s Consumer Privacy Act (the CCPA) is at the forefront of […]

Continue reading

GFI MailEssentials Multi-Server

GFI MailEssentials is a powerful and complete solution that provides anti-spam, anti-malware, and email security for on-premises mail servers. With its new multi-server feature, it became easier than ever to use and manage in large organizations. Let’s have a look at what this feature is and what it provides.   Multi-Server Feature Larger environments typically […]

Continue reading

November 2019 – Microsoft Patch Tuesday

November is bringing arctic winds to many parts of the United States, but as we sit and shiver and try to stay warm (and in my case, dream of the sunny Caribbean islands where I’ll be sailing later in the month), the hackers keep on hacking and the attackers keep on attacking, exploiting whatever vulnerabilities […]

Continue reading

The top 23 free data recovery tools – 2019 Update

How many times have you searched for a file only to find that it’s gone from your computer? Your fault, my fault, nobody’s fault… it doesn’t matter. When a file you need is gone, all you really want to do is get it back: as quickly and as painlessly as possible. Deleted by accident? Formatted […]

Continue reading

Attacks on DNS hit us where it hurts

The Domain Name System (DNS) is a part of the Internet that the typical business or individual computer user rarely thinks about. Many whose everyday work depends on it don’t even know it exists, and even some IT pros don’t really understand how it works. But without it, we would all have to memorize a myriad […]

Continue reading

Compliance Matters: Data identification and classification

Compliance is all about adhering to regulations established by governments and industries. The main focus of those regulations as they pertain to IT professionals can be summed up in one word: privacy.  Most of our compliance efforts are directed at protecting the privacy of personal identifiable data coming through our networks, stored on our systems, […]

Continue reading

October 2019  – Microsoft Patch Tuesday 

October is here and fall is in the air, even in Texas. Temperature dropped this past week from highs in the 90s to lows in the 50s (Fahrenheit). The state fair is in full swing here, and the stores are full of Halloween decorations. But to us IT security folks, ghosts and goblins aren’t nearly […]

Continue reading

Exinda Network Orchestrator Hardware Update

The Exinda Network Orchestrator appliance is purpose built for Network Managers and Administrators who want one solution to manage the way users, traffic, devices, and applications behave on the network. With Exinda Network Orchestrator, organizations can ensure reliable application performance, identify and control bandwidth usages, and understand network activity. The newest model (4062v2) is a […]

Continue reading