Blog

SDN & virtualized networks: how they differ

If knowing is half the battle, virtualization is one for the ages. With more than a decade of history, it’s a tough topic that business owners would be hard-pressed to ignore. Over the years, the terminology has changed and capabilities have gotten even more confusing. If you’ve ever heard anyone use software-defined networking and network […]

WebRTC: internet calls without the software

The VoIP industry is becoming increasingly hard to define. More and more are voice communications being made over internet connections, and sometimes you may not even realize you’re doing it. WebRTC is a newcomer to the internet-based telephony field. Read on to decide whether it’s for you. What is WebRTC? At its most basic, WebRTC […]

Office 365: What plan is the right one?

From Word to SharePoint, Office 365 has a lot offer. But each business requires different features from Office 365. Some may prioritize business analytics, while others may be content with no more than the productivity suite and Outlook. If you’re planning to deploy Office 365, first consider your business needs, then use the information below […]

Four helpful Cortana commands

If you aren’t using Microsoft’s voice-activated personal assistant, Cortana, you’re missing out on some beneficial, hands-free functionality. Because Cortana is now fully integrated into Windows 10, she can help you launch applications, make dinner reservations, and more. Try the following commands to make the most out of your virtual assistant. Hey, Cortana Before asking her […]

Healthcare software: a healthy development

No healthcare provider today can operate without robust technology backing them. That doesn’t mean they have to spend excessively on IT infrastructure they have to manage themselves. One of those tech expenses include costly healthcare software, complete with on-premise components that a healthcare company will be much better off outsourcing. The rising popularity of healthcare […]

Fileless malware: who are the targets?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Russian hackers target Mac OS X users

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a […]

Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

Attacks on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

Social media platforms that suit your SMB

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization. Instead, business owners should familiarize themselves with all the available […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +