Is your continuity plan doomed to fail?

Posted on Friday May 20, 2016

2016May20_BusinessContinuity_AJust because your IT provider has a plethora of awards and certifications under its belt doesn't mean that you can blindly hand over your business's future to them. Often times, there are some aspects in your business continuity plan that tend to be overlooked by your provider. We have rounded up some of these issues that could appear when you enact your business continuity plans.

 

7 best features that come with Android 6.0

Posted on Thursday May 19, 2016

2016May19_AndroidTablet_AAndroid Marshmallow has been one of the most anticipated software updates for Android users. Dubbed by Google as "the sweetest, smartest Android version yet", it was first unveiled at the company's I/O conference under the codename Android M. So what features do you look forward to when your tablet finally updates to Android 6.0 version? Read on.

 

OpenNotes portal initiative gaining steam

Posted on Wednesday May 18, 2016

2016May18_HealthcareArticles_AA recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor's notes. Since that initial study, the number of healthcare providers who have agreed to sign on has steadily risen. What is this service and how does it work? Let's find out.

 

2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0

Posted on Wednesday May 18, 2016

Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.
Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.

 

New security flaw in popular image uploader

Posted on Tuesday May 17, 2016

2016May17_Security_AImageMagick, one of the internet's most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site's data, or corrupt it entirely. Let's take a look at what your SMB should be doing to protect itself from this security flaw.

 

Microsoft's more secure Office web service

Posted on Monday May 16, 2016

2016May16_MicrosoftWindowsNewsAndTips_AEarlier this month, Microsoft made a huge announcement regarding Office that hasn't received much attention. While there is a lot of interest in web-based versions of Microsoft Office, many organizations avoided the Office Online services for fear of compromising their privacy and security. However, they've announced a new version that allows businesses to host an Office Online Server locally. Keep reading to find out if this new service could be useful in your SMB.

 

Page:   1...309310311312313314315316317...343

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016