There has been a lot of debate as to what your hardware refresh cycle should look like. The answer tends to fall somewhere in the 2 – 4 year ran[...]
Keep ReadingMany companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of mal[...]
Keep ReadingA recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab[...]
Keep ReadingIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea[...]
Keep ReadingAlthough empirical evidence that Facebook is listening to its users through the microphone settings available on smartphone apps for the social media [...]
Keep ReadingUnderstanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as[...]
Keep ReadingThere are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of [...]
Keep ReadingA June 2016 survey conducted by Pew Research Center showed that 77% of the 2,003 surveyed American workers reported that despite workplace policies li[...]
Keep ReadingTwo-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most d[...]
Keep ReadingiPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be ab[...]
Keep Reading