Blogs
Think your password is secure? Think again
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and
Disaster recovery myths you can dismiss
Technology changes so rapidly. With disaster recovery (DR), we see business owners clinging to ideas that no longer apply. What kind of DR myths are
Phishers use encrypted sites to scam
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now
How HIPAA wards off ransomware threats
Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files until the victim decides to
The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users
Why consider disaster recovery for 2017
The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017
Young workers are more gullible to tech scams
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to
The Importance of Disaster Recovery
Most business owners don’t normally think they will be a victim of a natural disaster…not until an unforeseen crisis happens and their company ends up
Categories
- Business (9)
- Business Continuity (7)
- Business Intelligence (2)
- Business Value (4)
- Cloud-Google Apps (3)
- Cloud-Office 365 (4)
- ERP & Microsoft Dynamics (1)
- General Healthcare IT (1)
- Google (1)
- Healthcare (1)
- Microsoft Office (3)
- Office (1)
- Productivity (2)
- Security (14)
- Uncategorized (2)
- Veeam (1)
- Virtualization (3)
- Virtualization General (1)
- Web (1)
- Web & Cloud (7)