Cyber security & managed services

Posted on Thursday January 12, 2017

2017january12_security_aCyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as much as you’d like to believe your business is safe, the worst could happen at any time.

 

Why consider disaster recovery for 2017

Posted on Wednesday January 11, 2017

2017january11_business_aThe new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it's important that you don't dismiss an old yet essential IT resolution: disaster recovery.

 

Facebook's group voice calling

Posted on Tuesday January 10, 2017

2017january10_socialmedia_a"What's your Facebook name?" is not a question you're often asked when someone needs your contact details. In the first place, Facebook messaging isn't everyone's voice call app of choice, especially for group conversations. As of now, Skype rules that arena, especially for business communications. However, once the social media giant has put the finishing touches on its desktop-capable group voice calling, you can expect to hear "What's your Facebook name?" a bit more. It might even become the norm.

 

3214296 - Vulnerabilities in Identity Model Extensions Token Signing Verification Could Allow Elevation of Privilege - Version: 1.0

Posted on Tuesday January 10, 2017

Revision Note: V1.0 (January 10, 2017): Advisory published.
Summary: Microsoft is releasing this security advisory to provide information about a vulnerability in the public version of Identity Model Extensions 5.1.0. This advisory also provides guidance on what developers can do to help ensure that their apps are updated correctly.

 

Flaw allows thieves to open locked iPads

Posted on Monday January 09, 2017

img-ipad-170px-op1Have you ever worried about your tablet's security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple's popular tablets, you need to know about a newly discovered flaw that allows thieves to bypass security measures and access your device.

 

The state of web services in 2017

Posted on Friday January 06, 2017

2016january6_webandcloud_aIt's a new year, and it's time to start thinking about what information technology will look like in 2017. That could mean anything from forecasting the costs of adopting new technology to upgrading your products to better integrate with new trends. Whatever it may be, we're putting down our predictions for how to get the most out of 2017's web services, right here.

 

Page:   1...292293294295296297298299300...353

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016