• Online Enemy #1: Blackhole Exploit Kit

    White Papers // Feb 2013 // provided by GFI Software

    There’s a new cyber bully out there that not only has frightened users, but continues to frustrate IT departments with its knack for exploiting the latest software vulnerabilities and infect otherwise well-defended systems and networks. Named the Blackhole Exploit kit, it stands out as a particularly effective example of an ...

    Find Out More
  • Network Security Report: The state of network security in schools

    White Papers // Feb 2013 // provided by GFI Software

    VIPRE conducted a web-based survey to understand the network security landscape in K-12 schools in the United States. Survey respondents included individuals responsible for IT and network security at public and private schools K-12 schools. Overall, the survey results reflect that schools have been able to achieve a relatively ...

    Read More
  • Antivirus: The Hippest New Apple Accessory

    White Papers // Feb 2013 // provided by GFI Software

    Remember the days when Macs users thought they were not targets of malicious behavior and would be relatively free of malware? For a while it was true, at least more than for PC users, for whom running antivirus programs is second nature. Now that landscape has changed. Cyber-attacks on ...

    Find Out More
  • Mobile Device Management

    White Papers // Jan 2013 // provided by GFI Software

    Today, mobile security is a more than just a reality. It’s at the forefront of security concerns for organizations that encourage and support mobile workforces and who do business on the go - anywhere, anytime. From the increase in Bring Your Own Device (BYOD) to the proliferation of mobile ...

    Read More
  • Antivirus Management in the Cloud for Small Businesses

    White Papers // Jan 2013 // provided by GFI Software

    Learn which malware defense is best for your small business. Thanks to cloud computing, centrally managed antivirus is now available to SMBs (businesses with 500 employees or less) and SMBs that have already taken advantage of a centrally managed antivirus now have more option than ever to select the ...

    Find Out More
  • GFI Case Study: Mitsubishi Polysilicon

    White Papers // Jan 2013 // provided by GFI Software

    Learn how Mitsubishi Polysilicon solved their need for malware protection. Unhappy with their current antivirus product, Mitsubishi Polysilicon set out to find a malware solution that would not interfere with users' ability to work on their PCs during scans. After doing their research they found an antivirus product ...

    Read More
  • Antivirus Evaluation Guide

    White Papers // Jan 2013 // provided by GFI Software

    Selecting the right antivirus solution for your company is as simple as 1, 2, 3. IT administrators are now faced with a unique set of challenges keeping their organization as well as their user base and clientele protected against both internal and external security threats. It has become of ...

    Learn More
  • Email Security in Small and Medium-sized Businesses

    White Papers // Jul 2011 // provided by GFI Software

    No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without.

    Read More
  • Towards a Comprehensive Internet Security Strategy for SMEs

    White Papers // Jun 2011 // provided by GFI Software

    The web is an integral part of how all businesses, especially Small to Medium sized Enterprises (SMEs), and their employees communicate, collaborate and succeed. In this paper, the authors discussed about the web-based threats, the prevalence of malware as a vehicle for organized Internet crime, along with the general inability ...

    Download Now
  • Why SMEs Need to Deploy a Web Monitoring Tool

    White Papers // Jun 2011 // provided by GFI Software

    Sufficient evidence exists that Internet misuse is a widespread problem in every company that has an Internet connection. Misuse borders from the occasional transgression to serious impact of a company's productivity. Cyber criminals have and will continue to exploit vulnerabilities wherever they find. Being without a basic protection methodology such ...

    Download Now