Latest posts

Page 2

Regulatory Compliance Requirements for Business Situations

Compliance is everybody’s business SMBs must be just as concerned with compliance as enterprises Regulatory compliance is a big focus for big businesses today. Privacy concerns are driving government regulation, and some industries are proactively adopting their own privately enforced rules in an effort to head off further government interference. Enterprises are in the spotlight […]

Continue reading

 “View As” Facebook hack affects 90 million users

 “View As” Facebook hack affects 90 million users In late September Facebook revealed details of a security breach they had apparently first spotted close to two weeks earlier. The problem was rooted in a feature (View as) allowing users to view their Facebook pages the way others would see them, which inadvertently allowed attackers to […]

Continue reading

October 2018  – Microsoft Patch Tuesday 

October 2018  – Microsoft Patch Tuesday  Each year seems to go by more quickly than the last, and here we are – already into the fourth and last quarter of this year that feels as if it just started. Microsoft updates have already been in the news this month, and not in a good way. […]

Continue reading

Honeypot Security System Strategy

Sweeten your security strategy with a honeypot security system Implementing honeypots and honeynets as part of your network intrusion prevention/detection process   We’ve all heard the old saying that you can attract more flies with honey than with vinegar.  When the pests we’re dealing with are network attackers and intruders, most of us focus on […]

Continue reading

There’s still time to implement BYOD this year

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […]

Continue reading

GFI Unlimited: Changing the SMB Channel Landscape

With unlimited product installations, free technical support, all for one flat-fee, it’s easy to spot the customer benefits of GFI Unlimited. But did you know, GFI Unlimited offers partners an innovative way to sell software, away from the usual constraints of managing different licenses for different products? We caught up with Johannes Kamleitner, SVP & […]

Continue reading

Consent is not enough (part 2): GDPR recordkeeping, reporting and notification requirements

Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent can be key to proving that your organization’s collection, storage, and processing of personal data of individuals is lawful under the GDPR.  Then earlier this month, in part one of the “Consent is not enough” series, I discussed […]

Continue reading

What’s the difference between WAN optimization and WAN acceleration?

This is a trick question! Technically, there is not a difference between WAN optimization and WAN acceleration. As a matter of fact, WAN acceleration is a type of WAN optimization. Now that we have cleared that up, we can now get into WAN optimization and what you can do to make the most out of your […]

Continue reading

September 2018 – Microsoft Patch Tuesday

Although summer isn’t officially over until later this month, it might as well be autumn already where I live. School has started, the swallows that nest in our eaves have left for South America, the weather has grown slightly cooler (and rainier), and the Atlantic is full of hurricanes (which I narrowly avoided by cruising […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading