Latest posts

Controlling Internet access at the application layer

You want to permit your users to access the web and all the good it has to offer, but you need to protect your users, your business, and your customers from all the bad. What do you do?

Continue reading

How to troubleshoot Exchange ActiveSync connections

Ensuring that Exchange ActiveSync is working properly on both your Exchange infrastructure and your users’ myriad mobile devices is one of the most important things you can do. Usually, EAS works perfectly well, so this is not a problem for you. But occasionally, things do fail, so knowing what to look at and how to troubleshoot are critical skills. This article should help get you started.

Continue reading

Clever phishing attack uses Dropbox to spoof Dropbox

Dropbox recently detected and shut down a spoofing page designed to grab users’ credentials to Dropbox and other webmail based systems that was hosted on Dropbox itself.

Continue reading

Play ball! But make sure critical apps don’t strike out

As users go looking for the plays of the day, interviews with the players, and perhaps even the odds for the next game, you need to make sure that their enthusiasm for the game doesn’t cause productivity issues, or worse, prevents critical business apps from functioning.

Continue reading

OLE again: Microsoft Security Advisory warns of remote code execution risk

Today (October 21) Microsoft put out another security advisory regarding OLE. Once again, opening a maliciously crafted Office file could expose a system to attack if someone exploits this vulnerability.

Continue reading

Embrace the cloud without compromising security

GFI WebMonitor’s inbuilt understanding of the most popular web-based applications and cloud services can help sysadmins enforce policy and protect users.

Continue reading

Oh, no – not again: More patch problems rear their ugly heads

It seems October is bringing brand new troubles for those who were brave enough to install the Microsoft Patch Tuesday patches immediately after release.

Continue reading

Does your bandwidth belong to autoplay videos and ads?

Here’s how you can protect your users from the bandwidth leeches like autoplay video ads, as well as from malware, phishing sites, and policy violations.

Continue reading

What’s new in GFI WebMonitor 2015?

Product manager, Calin Ghibu explains why the latest version of GFI WebMonitor is the next generation of web security software for businesses and what’s so special about this release.

Continue reading

SSL 3.0 vulnerability poses widespread threat

POODLE is an industry-wide threat because it’s a vulnerability in the SSL 3.0 protocol, which is supported by almost all web browsers on all platforms.

Continue reading