computer chip

Trapped in the Cryptolocker; 5 Ways to Avoid This Latest Phishing Intrusion

Phishing, the art of stealing passwords and confidential information using trickery and gullibility, is a continuously evolving art. It can be very simple to very complex, but draws in enough victims to be highly profitable and something that is not going away anytime soon. Read more

Data Backups: What You Need to Know

No matter what business you’re in, the most important thing you can do for its survival is making sure that your assets and capital are both secure and protected from loss or damage. For many modern businesses, their primary asset is data. Data is an integral part of how virtually all businesses operate today. Although the method and medium (tape, disks, cloud) have changed, the need is universal.

Read more

Best Practices for Data Replication Between Data Centers

For most businesses, organizations, and individuals, data is everything. Unfortunately, it can all be lost within a matter of seconds. This makes data replication absolutely essential for your protection. With so many options to choose from, it can difficult to determine which one is best for you. Let’s look at several of the best practices for data replication between data centers. Read more

How Does Virtualization Benefit a Business?

The world of business has always been fast-paced; however, it’s picking up speed every year. Everyone from small mom-and-pop shops to worldwide corporations are evolving. With the constant changing of the times, it is imperative that businesses have a reliable, updated technology foundation. Read more

IT Consultant Headshot

How to Select an IT Consultant

Selecting an IT consultant is a critical element for ensuring success in contemporary business. As a source of accurate and relevant information, your IT consultant can assist in broadening your company’s knowledge base. By bringing a top-shelf consultation on board, you can feel confident that you are making well-informed IT decisions for your business going forward. Read more

BYOD image

How to Approach Network Security in a ‘Bring Your Own Device’ Workplace

Mobile technology is still surging in popularity. According to TechCrunch, a study by International Data Corporation reports that smartphones, and tablets are projected to command 83 percent of the total worldwide market for device sales by 2017. Compare this to 11 percent for laptops and just 6 percent for desktop PCs, and you get the picture that mobile is not going away anytime soon. Read more

Moving Assets to the Cloud

In the 20th century, security often meant anything from lockboxes and safes to armed guards, and there is little doubt that this line of thinking is dated. In the 21st century physical security still has a place, but more of our assets are are digital. New asset forms require new means of protection.  With the explosion of digital assets many small and medium businesses are asking, “should I move my assets to the Cloud and how do I do it securely?” Read more

malware infection

Unusual Suspects: 4 Types of Malware You Haven’t Heard Of (Until Now)

The topic of malware often causes some confusion. Most people know about viruses and that they need protection on their computers to prevent infections. However, the types of harmful programs that fall under the “malware” heading encompass more than just computer viruses. Read more