Law firms have become an increasingly popular target for cybercriminals. As most client data is now collected and stored in a digital format, firms ha[...]
Keep ReadingIn late 2015, Congress passed and signed the PATH Act (Protecting Americans from Tax Hikes Act), which had the added benefit of increasing the Section[...]
Keep ReadingWhatever industry your enterprise is part of, having a viable business continuity (BC) and disaster recovery (DR) plan in place is paramount to doing [...]
Keep ReadingThere has been a lot of debate as to what your hardware refresh cycle should look like. The answer tends to fall somewhere in the 2 – 4 year ran[...]
Keep ReadingMany companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of mal[...]
Keep ReadingA recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab[...]
Keep ReadingIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea[...]
Keep ReadingAlthough empirical evidence that Facebook is listening to its users through the microphone settings available on smartphone apps for the social media [...]
Keep ReadingUnderstanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as[...]
Keep ReadingThere are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of [...]
Keep Reading