Author: GFI Software

How can you prevent data leakage?

Every company stores data that it considers valuable or is covered by strict privacy requirements. Obviously, organizations must do everything to protect this data against any abuse or unauthorized use. A data breach not only results in direct financial damage for the organization, but also leads to loss of reputation. And now, with new legislation in place, companies can face heavy fines if perso...

Keeping productivity up this festive season

The festive season is just around the corner. Shopping online is very convenient, especially head of the Christmas season, and honestly, who can resist those mailers by your favorite retailer letting you know what’s on sale this Black Friday and beyond? Many business owners choose to provide unlimited internet access to their employees and while this can be seen as a great idea as it shows trust, ...

Eight Tips for Windows 10 Migration

Business interest in deploying Windows 10 is high but sysadmins need to plan their Windows 10 migration strategy well, as a badly executed plan will cost a businesses both time and money.  The arrival of Windows 10 has brought about some welcome changes as it offers users a different interface to Windows 8 and goes further to unify the desktop, laptop and mobile device ecosystem. Many have already...

BYOD: Another acronym for bring your own danger?

Without any doubt, your employees are already bringing all sorts of devices to work and many of them use these devices (mobile phones, tablets, laptops etc.) to carry out tasks related to their job. This phenomenon has developed its own term: BYOD, or Bring Your Own Device, but apart from all the benefits of BYOD, which range from increased productivity, to cost savings and overall convenience, th...

Protecting yourself with layered security

Protecting yourself with layered security With data breaches becoming more frequent and costly, securing defenses is a priority. However, security can be a double-edged sword because while it protects mission critical systems, many fail to understand that in information security, the threat landscape is ever-evolving, the industry itself is changing and thus, the focus on security needs to be an o...