Blog
Wearables are Fashionable, But Are They Secure?
Wearable technology, especially Smartwatches, including the Apple Watch, the Samsung Gear, and the Microsoft Band, are all the rage and are expected to become even more popular over the coming years. According to the International Data Corporation (IDC), 2015 will see as many as 72.1 million wearables shipped. They are popular and fashionable, but do they leave your network open to potential security breaches?
Does Your Business Have a Password Management Policy?
In order to keep your business up and running and to avoid being hacked, your company must develop an effective password management policy. This is especially true for any business that must comply with HIPAA, PCI, and/or other regulatory compliances, as regulatory scrutiny and fines can be costly and time consuming. The following four steps can help protect your business from disruption.
Is Your Business Ready for a Disaster?
Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—this might include a hurricane, an earthquake, a power outage caused by a fire or a cyber attack by hackers.
Windows 10 – Best Windows Ever?
The new Windows 10 operating system is purported to be the best Windows ever. The combination of ease of use for new users, automatic updates, and built in security features is causing small to medium sized businesses to breathe a sigh of relief as business owners dream about spending less time and money on training and more energy on making money – finally.
The Most Recent Data Breaches and Their Consequences
Big data breaches have been making headlines more and more frequently. It was announced last week that the computer systems at the U.S. Office of Personnel Management had been breached. This is the second computer break-in in the past year for the agency. An estimated four million current and former federal employee records may have been compromised.
Moving to the Cloud: The Advantages
According to the International Data Corporation (IDC), total public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. Compared to the 4.1% compound annual growth rate the IT market will experience from 2013-2018, the public Cloud will grow at a 22.8% compound annual growth rate. That’s five and a half times more than the total IT market spending!
Protect Your Organization from Ransomware
It’s a moment every business owner dreads. A message appears on your organization’s computer screen alerting you that your files have been encrypted and the only way to access them is by paying a ransom. Security threats to computers and mobile phones have grown more sophisticated around the globe in the past few years.
The Cloud: The 3rd Platform of Computing
Around 2008, the IT industry started to experience a massive shift in traditional computing. The International Data Corporation (IDC) began referring to this change as the “3rd platform.” The 3rd platform is built on the four technology pillars for innovation and growth: Cloud, mobile, big data, and social technologies.
Beware of Cryptolocker
Imagine you are on your personal or work computer, and you receive a seemingly innocuous email from a trusted source, such as your bank, your tax office, or even a friend. The source asks you to download a file to update important account information. But, when you click on it, your most important files become encrypted and you are threatened you will lose them unless you pay a sizable sum to get them back!
FCC Approves Net Neutrality Rules
After a landmark vote on February 26, The Federal Communications Commission officially classified Internet providers as public utilities. The new net neutrality rules were approved 3 to 2 among party lines. The rules ban high-speed Internet providers, such as Verizon, AT&T, and Time Warner Cable, from blocking websites, slowing down content from particular sites, or selling-off faster traffic speeds to the highest bidders.
Recent Comments