Month: October 2016

There are many ways that technology innovations aid business transformation in 2016. Hardware and devices and the software they run have never been more task-friendly and interactive. Virtualization, mobile device apps, and networking tools enable collaborative virtual work environments that can create globally-connected work environments. Social media platforms are increasing online marketing and visibility at

In June of this year a massive hacking incident occurred that involved over 32 million accounts. According to LeakedSource, the Dark Web came into possession of the information linked to those accounts and put it up for sale. If you haven’t switched to two-factor authentication (2FA, a.k.a. TFA, or multi-factor authentication, or MFA) for your

In a September 16 alert, the FBI warned of ransomware variants that are more frequently targeting highly-vulnerable business servers and how they are like a focused virus, looking for big servers without adequate security defenses. The law enforcement agency also noted that the number of compromised network servers and devices have drastically multiplied, via more

Whether or not you are concerned about making your website more secure, switching to an HTTPS security-encrypted web platform is still a good idea. Why, you ask? Because having that extra level of security for your browser and site visitors will increase your Google ranking. This is actually old news, and was announced on the

  Your business relies on technology to run effectively. But unfortunately, that technology can’t run all by itself. Your IT infrastructure needs routine maintenance to function effectively, and even then unexpected issues can pop up that will need an immediate solution. Budgeting for IT upkeep and repair can be a nightmare. Paying by the hour

Too many business entities are woefully deficient in their backup plans. Many think that one or two external drives and some cloud backup is enough. Others have less than that in backup, simply depending on server rebuilding or replication in the event of a “smoking crater” type of disaster. But, it’s not just the fire

We all see the news stories about the big organizations like hospitals and government agencies suffering cyber breaches, but small and medium-sized businesses also need to be hyper-aware of the threat level to their own IT networks and databases as well. Because of this ongoing, pervasive threat of cyber breach – from within and without

One way cybersecurity can be improved to a great degree is by creating strong, hard-to-decipher passwords that are difficult for hackers to discern. These days, cybercriminals are highly motivated, and can get at simply hashed, basic, alpha-numeric passwords using various methods. There’s good advice all over the Net on the creation and maintaining of passwords

Many companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of malware infection in general. With ransomware sneaking into more IT systems than ever before, and at such an alarming rate, organizations and enterprises are having to put cybersecurity and disaster recovery on