Sign up | Login with →

Security

4 HUGE Misconceptions About Business IT Security

May 24, 2016 by Kyle Cebull

When it comes to IT security, many business owners think that hackers are only targeting large businesses. We see things like the Target and Home Depot breach in the media and we think they’re the only ones having trouble with hackers. But the fact of the matter is that more and more, hackers are turning to small businesses to try to...[read more]

Top 5 criteria to consider in a data protection provider

May 24, 2016 by April Sage

Your organization’s data is money unaccounted for on the balance sheet, and it must be protected. A secure production site with no single point of failure goes a long way, but disaster recovery is the insurance that keeps you running in case of a fire, cyber attack, or accidental database wipe. Many factors, most importantly...[read more]

exclusive

Locky Ransomware Statistics: Geos Targeted, Amounts Paid, Spread Volumes and Much More…

May 19, 2016 by David Balaban

Locky is quite a recent encryption virus that has created waves in the cyberspace by attacking the system of Hollywood Presbyterian Medical Center during February. Plenty of patients at the medical center had to be shifted to other centers because of the attack. This attack has been the worst ransomware nightmare of the year and the...[read more]

exclusive

5 Essential Steps To Take After A Data Security Breach

May 19, 2016 by Particia Dimick

Hackers are an insensitive breed, with no respect for violating other people’s finances and personal business dreams.Like pickpockets stealing wallets, they steal usernames and passwords to get access to credit lines, bank accounts, and payment processors. Like con men, they look for data that will allow them to steal someone’s...[read more]

Your Business’ Network Needs IPS and IDS – Here’s Why

May 17, 2016 by Elianna Hyde

When it comes to ways of keeping your network safe, you need to have an intrusion prevention and detection service. Without these services, you are likely going to find out that there is a problem within your network, when it is too late. You need to be on the lookout at all times, but if you were to do it manually, you would not have...[read more]

Can We Trust Salesforce for Business in the Cloud?

May 16, 2016 by Mark Smith

I have been meaning to write about Salesforce since its Dreamforce 2015 conference. Salesforce provides a platform, tools and applications for business and IT who claims to be the ‘no software’ company which as you will read is exactly what happened on May 10th. Heck, Salesforce is making a lot of advances on its platform, its...[read more]

4 Things to do to Reduce your Risk of Server Failure

May 11, 2016 by Kyle Cebull

I can’t stress enough the importance of treating your technology and equipment properly. While we recommend that our clients always have equipment that’s within warranty, when you aren’t taking proper care of it or are neglecting it in certain ways, it can absolutely fail sooner. Your server is your lifeline. It’s where you store all...[read more]

exclusive

8 File Types, Databases and Platforms You May Not Know Can Be Rescued

May 11, 2016 by Rehan Sheikh

Compromised files and data is something we don’t tend to worry about much these days. Backup to the cloud and other forms of remote digital information storage have us accustomed to the data always being there, somewhere.Sometimes, however, this isn’t the case. Plenty of critical, crucial data for individuals and businesses wind up...[read more]

Blockchain disrupting many industries

April 12, 2016 by Sandeep Raut

Until recently, Blockchain was a term only known to geeks and specialists. But in the last six months it has become a buzzword.In very simple terms Blockchain is the act of recording events in a database. The database itself is referred to as the Blockchain. Once data is added to the Blockchain, it cannot be removed from the database or...[read more]

exclusive

5 Ways Local Governments Can Benefit By Embracing The Cloud

April 8, 2016 by Elianna Hyde
1

Many people look at the way their local government operates and think that they are still working like it is the stone age. They see governments working with massive amounts of paperwork. They look at the amount of time that it takes to get information or to get anything done that involves the local government. It leaves people to wonder if there is anything that can be done to improve the way the local government operates.[read more]

The Panama Papers- It’s all about the data!

April 8, 2016 by Jagadish Thaker

The Panama Papers has set an excellent example for the world about the importance of data science when it comes to analyzing big data. This leak makes us realize that appropriate approaches are needed to handle the challenges of data management for the present and the future.[read more]

Disrupting Nation State Hackers With the Security Basics

April 6, 2016 by Thu Pham

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.[read more]

Cloud Security: A Key to Cloud Computing’s Growth

March 28, 2016 by Sean Shado Shado

Gone are the days where IT professionals are asking: “what exactly is cloud computing?” It’s 2016 – everyone has some form of understanding of the cloud. This can be seen in the data itself - nine out of ten organizations use the cloud in one way or another, with data centers, servers, and disaster recovery being the most used cloud...[read more]

Business Continuity RPO and RTO: Why Should I Care?

March 22, 2016 by Kyle Cebull

Disaster recovery is pretty important, right? You need to be able to work at some point if your network goes down because of a major disaster, whether it’s a natural disaster or a result of some sort of network invasion or massive failure. While there are a lot of acronyms in the technology management industry, when it comes to disaster...[read more]

Tactics to Protect Against Most Common Cyber Attacks

February 19, 2016 by Peter Davidson

Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability.[read more]