Blogs

Virtualization is different from the cloud
Virtualization and cloud computing can be confusing, especially to business owners who are not familiar with them. But when you understand their differences, you’ll be

Think your password is secure? Think again
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and

Disaster recovery myths you can dismiss
Technology changes so rapidly. With disaster recovery (DR), we see business owners clinging to ideas that no longer apply. What kind of DR myths are

Phishers use encrypted sites to scam
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now

How HIPAA wards off ransomware threats
Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files until the victim decides to

The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users

Why consider disaster recovery for 2017
The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017

Young workers are more gullible to tech scams
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to
