Latest posts

Page 2

GFI Unlimited: Changing the SMB Channel Landscape

With unlimited product installations, free technical support, all for one flat-fee, it’s easy to spot the customer benefits of GFI Unlimited. But did you know, GFI Unlimited offers partners an innovative way to sell software, away from the usual constraints of managing different licenses for different products? We caught up with Johannes Kamleitner, SVP & […]

Continue reading

Consent is not enough (part 2): GDPR recordkeeping, reporting and notification requirements

Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent can be key to proving that your organization’s collection, storage, and processing of personal data of individuals is lawful under the GDPR.  Then earlier this month, in part one of the “Consent is not enough” series, I discussed […]

Continue reading

What’s the difference between WAN optimization and WAN acceleration?

This is a trick question! Technically, there is not a difference between WAN optimization and WAN acceleration. As a matter of fact, WAN acceleration is a type of WAN optimization. Now that we have cleared that up, we can now get into WAN optimization and what you can do to make the most out of your […]

Continue reading

September 2018 – Microsoft Patch Tuesday

Although summer isn’t officially over until later this month, it might as well be autumn already where I live. School has started, the swallows that nest in our eaves have left for South America, the weather has grown slightly cooler (and rainier), and the Atlantic is full of hurricanes (which I narrowly avoided by cruising […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading

30 network security Twitter feeds to follow

Twitter is where information is updated within seconds, especially in the information technology industry. Every day, tweets are sent out at up to 240 characters to share news and personal views as they happen. We have rounded up the top 30 sysadmin twitter accounts that you need to follow based on the number of followers […]

Continue reading

Consent is not enough (part 1): GDPR data security requirements

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […]

Continue reading

Last month’s top cybersecurity stories – August 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cyber security stories of August 2018. Fortnite app comes to Android, bringing multiple security worries Wildly popular shoot-em-up game, Fortnite, finally came to Android this month, […]

Continue reading

Nonprofits need IT security and communications software too

Nonprofit organizations do not follow a lot of the same rules as other businesses. They normally deal with grants, donations, and monies for other sources than themselves. Every nickel and dime has to be accounted for. Nonprofits have to make sure they can tell you which cause the money you donate will be helping. With […]

Continue reading

Third Party Patch Roundup – August 2018

Summer is almost at an end, and the months ahead are sure to be hectic as always as we sail toward the holiday season and the end of yet another year. Because those holidays also serve as a prime time for spammers, scammers, and attackers, it’s important to get ahead of the game and start […]

Continue reading