Sign up | Login with →


Remove IT Systems from All Branch Offices to Save Money and Harden Your Security Posture

July 29, 2016 by Sean Shado Shado

The number of enterprise employees who work in remote offices and branch offices (ROBOs) continues to rise, and consequently, so do the amounts of business-critical information stored in these locations and IT budget dollars devoted to managing these systems. Yet one figure that is not going up is the small number of dedicated IT...[read more]


4 Best Practices for Backing Up and Recovering Data

July 15, 2016 by Ryan Ayers

Protecting and accessing company data is an issue every modern business, large or small, needs to prioritize. According to 24/7 Wall Street, there have been 16% more data breaches in 2016 than during the same period in 2015, and this upward trend is not new. With data breaches on the rise each year, preserving irreplaceable data should...[read more]

BYOD 411: 3 Ways Pokemon Go is Impacting Businesses

July 12, 2016 by Kyle Cebull

BYOD (bring your own device) is a pretty great thing for both employees and employers. It saves the additional capital in spending money on devices and also ensures employees will always have access to their data and e-mail. But it can be difficult to manage and sometimes can cause issues if BYOD isn’t managed properly. Over the...[read more]


Personal Data Protection: Identity Theft Is on the Rise

July 8, 2016 by David Balaban

In 2015, varying with the type of identity theft, identity thieves harmed eighteen million people only in the USA. That’s approximately twofold increase compared to 2014.The shift from the stripe to chip cards has encouraged criminals to switch to scientifically advanced methods of operation. For crooks, the Social Security Number is the...[read more]


Data Security - Why Your Investments May Not Be Enough

June 28, 2016 by Anand Srinivasan

Despite an increasing focus on data storage and access standards across organizations, security has remained a cat and mouse game where hackers continue to win on a fairly routine basis.[read more]

5 steps to protect your business data in a mobile world

June 23, 2016 by Joe Stangarone

While mobility offers many advantages to the modern business, it brings new security challenges. How can your business protect your sensitive data in a mobile world? How can you maintain security, when you can’t control every device in your organization? In this article, we explore 5 steps you must take to protect your business data in a mobile world.[read more]


Cybercrime: could tokenization and blockchain help end data theft?

June 17, 2016 by Daniel Matthews

Data theft plagues banks. Blockchain and tokenization are potential solutions to the problem. So why won't banks use them?[read more]

How the Cloud can Make your Business Disaster Proof

June 16, 2016 by Kyle Cebull

 When we think of disaster, we think of floods, malware, hacks, tornadoes, hurricanes… really major disasters. We think of servers that fail because they were poorly maintained. We think of an entire office catching fire. The odds of these things happening are not very good. But the human element of disaster is much more frequent....[read more]

Defining SQL Server Security Roles for Better Security Management

June 11, 2016 by Jenny Richards

SQL server databases have multiple users accessing and viewing data. It gives administrator extra concern regarding maintenance of security.[read more]

4 Must-Haves in your IT Disaster Recovery Plan

June 10, 2016 by Kyle Cebull

 Disaster recovery is a pretty important aspect of your technology. While it’s rare that flooding, hurricanes, power surges, fires or tornados strike; other types of disasters like viruses, ransomware, hardware failing and human error are even more likely to be the source of a data loss or failure. The fact of the matter is that...[read more]

The Marriage of Ransomware and DDoS

June 7, 2016 by David Balaban

A new version of ransomware has been detected recently that not just holds the data hostage and the victim’s machine until a ransom has been paid but also has the machine exploited as a part of DDoS attack. This implies that the victim cannot access the endpoint. Service is denied to another victim utilizing the same end point. This...[read more]

4 HUGE Misconceptions About Business IT Security

May 24, 2016 by Kyle Cebull

When it comes to IT security, many business owners think that hackers are only targeting large businesses. We see things like the Target and Home Depot breach in the media and we think they’re the only ones having trouble with hackers. But the fact of the matter is that more and more, hackers are turning to small businesses to try to...[read more]

Top 5 criteria to consider in a data protection provider

May 24, 2016 by April Sage

Your organization’s data is money unaccounted for on the balance sheet, and it must be protected. A secure production site with no single point of failure goes a long way, but disaster recovery is the insurance that keeps you running in case of a fire, cyber attack, or accidental database wipe. Many factors, most importantly...[read more]

Best Practices: Identify What Ransomware Locked Your Data

May 24, 2016 by David Balaban

ID Ransomware is a free website that has been launched by malware researches and where the victims of ransomware attacks can obtain help in dealing with their difficult situation. This website can make the life of victims easier by letting them identify the variant of the ransomware their computer has been affected with. This makes it...[read more]


Locky Ransomware Statistics: Geos Targeted, Amounts Paid, Spread Volumes and Much More…

May 19, 2016 by David Balaban

Locky is quite a recent encryption virus that has created waves in the cyberspace by attacking the system of Hollywood Presbyterian Medical Center during February. Plenty of patients at the medical center had to be shifted to other centers because of the attack. This attack has been the worst ransomware nightmare of the year and the...[read more]