Blogs
Think your password is secure? Think again
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and
Phishers use encrypted sites to scam
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now
How HIPAA wards off ransomware threats
Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files until the victim decides to
The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users
Young workers are more gullible to tech scams
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to
Recent Posts
- What is Zerto? A Quick Guide to a Premier Disaster Recovery Solution
- What Businesses Need To Know About SOC2 Compliance
- Our Journey to the Top – Zimcom, A Liberty Center One Company, Ranks Among America’s Fastest-Growing Companies in 2023
- Backups vs. Disaster Recovery: Understanding the Essentials for Your Business
- AWS vs. Azure Pricing and Support vs. Zimcom
Categories
- AWS (1)
- Azure (1)
- Backup & Disaster Recovery (3)
- Business (9)
- Business Continuity (7)
- Business Intelligence (2)
- Business Value (4)
- Cloud-Google Apps (4)
- Cloud-Office 365 (5)
- Cybersecurity (1)
- ERP & Microsoft Dynamics (1)
- General Healthcare IT (1)
- Google (1)
- Healthcare (1)
- Microsoft Office (3)
- Office (1)
- Productivity (2)
- Security (14)
- Uncategorized (3)
- Veeam (1)
- Virtualization (3)
- Virtualization General (1)
- Web (1)
- Web & Cloud (7)