Accidents happen. Eventually, something will go wrong within your IT infrastructure and when it does, you are going to want to be data-protected. Havi[...]
Keep ReadingCyber attacks happen every day. Now, Microsoft is helping you protect yourself from ransomware with their most recent update. Cyber threats are becomi[...]
Keep ReadingWindows Server 2016 is now available for general use. Its release coincides with contemporary information technology trends concerning containerizatio[...]
Keep ReadingLaw firms have become an increasingly popular target for cybercriminals. As most client data is now collected and stored in a digital format, firms ha[...]
Keep ReadingIn late 2015, Congress passed and signed the PATH Act (Protecting Americans from Tax Hikes Act), which had the added benefit of increasing the Section[...]
Keep ReadingWhatever industry your enterprise is part of, having a viable business continuity (BC) and disaster recovery (DR) plan in place is paramount to doing [...]
Keep ReadingThere has been a lot of debate as to what your hardware refresh cycle should look like. The answer tends to fall somewhere in the 2 – 4 year ran[...]
Keep ReadingMany companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of mal[...]
Keep ReadingA recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab[...]
Keep ReadingIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea[...]
Keep Reading