The Importance of Disaster Recovery

Believe it or not, the business world can be very unpredictable. Sometimes, it’s best to expect the unexpected. Customers come and go, your business plans may change suddenly, or the company could end up having budget issues. With that said, this is why it’s important to have a contingency plan for these incidents. After all, the way you’re running things in the workplace, may be subject to change in a few years. Generally speaking, that’s the nature of owning a business. Continue Reading

  • 08/18/2016
  • IT

Endpoint Security: What It Is and Why It’s Important

Endpoint security is defined as the process of securing various endpoints on a data network, often involving end-user devices like mobile phones, iPads, desktop PCs, and laptops. Additionally, hardware can also be considered an endpoint. An example of this would be servers in the data center. An exact definition of an endpoint largely depends on who you ask, as every security leader has a different idea. Basically, though, endpoint security tackles those risks that are presented by various devices connecting to a main network. Continue Reading

Dealing With Ransomware

When you’re working at a business, it’s always important to be knowledgeable of the tips and tricks hackers can use to steal your information. Whether they’re setting up a fake website that asks you to enter your social security number, or are sending you an email that appears to be from a coworker, there’s more to protecting your network than simply having the right security. You have to be aware of the ways your information can be stolen as well. With that said, ransomware is one of the most dangerous programs, and should be prevented at all costs. Continue Reading

Mac vs PC: The Choice is Yours

Several products, subjects, and issues in the world come down to a choice between two competitive entities. In other words, are you a Coca-Cola drinker or a member of The Pepsi Generation? You could be a proud Yankees fan or a loyal Red Sox fan. What about Republican versus Democrat? Ooh, that’s a particularly hot-button one these days. Forget about that for now. How about this one: Mac vs PC?  Continue Reading

  • 07/29/2016
  • IT

How Streaming Media Affects Your Network Bandwidth

What do Netflix, Hulu, Amazon Video, Amazon Music, Spotify, HBO, Pandora, Spotify and scores of other streaming media services all have in common? They can bring your data network to its knees and bring worker productivity to a screeching halt. They can cause hard-to-diagnose network problems, slow your network to a crawl, and create headaches for both IT and human resources.  And, worse of all, many employees use them at work without a second thought to the problems they are creating for your business or their coworkers. Continue Reading

  • 07/15/2016
  • IT

Mobile Technology in the Workplace

Whether it’s in the current era, or over a decade ago, there’s no doubt technology plays an important role in the workplace. After all, most companies wouldn’t thrive without it. Whether you’re using devices to better interact with your customers, or it’s helping you accomplish your tasks faster, it’s only second to customers in terms of importance. If anything, technology plays even more of an essential role today, than it did years ago.

Continue Reading

  • 07/11/2016
  • IT

Planning for Disaster Recovery

We don’t like to think about disasters, but preparing for them is better than ignoring them. FEMA estimates that 40% of businesses that experience a disaster never open again, and 25% last no more than a year after that. One of the big reasons for this is data loss. If a fire or hurricane destroys a business’s data records beyond recovery, the chances of putting the pieces back together are poor. However, a business with a disaster recovery plan can make it through a catastrophe with its data intact and get up and running quickly. Continue Reading

Whaling: Phishing for the Big Ones

You may have encountered the term “whaling” when IT people talk about spam email. It’s like phishing, but it directs its bait at really big prey.

Phishing is email designed to trick people by pretending to come from a legitimate source. The sender hopes the victim will open an attachment, click a link, divulge a password, or otherwise do something that will open a security hole which the attacker can exploit. Often it directs the recipient at a website that impersonates a government agency or business. Continue Reading

Ransomware – Extortion One Document At A Time

Since September 2013, when the ransomware plague was unleashed on the internet in the form of CryptoLocker and its copycats, to the time of this post, there are now well over a hundred different strains and the end is not in sight. Ransomware has proven to be a highly successful criminal business model and many aspiring cybercriminals big and small are now trying to muscle into this racket. Continue Reading

1 2 3 26