Tag Search: security
Posted on Friday October 07, 2016 | social engineering, security, phishing, cybersecurity
Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.
Posted on Wednesday September 21, 2016 | zero day attack, security, ransomware, phishing, patch, malware, cyber attackers
As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you're looking for a list of the industry's most relevant terms, you've come to the right place.
Posted on Thursday September 08, 2016 | vmware, virtualization, security updates, security, patches
Sometimes technology solutions seem safer merely because they're not widespread enough to be a lucrative target. Although increasingly popular, virtualization's resilient protection protocols and low adoption rates tend to offset the cost vs. benefit considerations of creating an exploit. Or at least, that was the case. Late last month VMware announced an update to patch a gap that allowed attackers to compromise virtualized cloud infrastructures. We've compiled everything you need to know to protect yourself here.
Posted on Monday September 05, 2016 | security, medical data, hipaa, healthcare, emr, data compliance
If your organization hosts data regulated by the US government, you're familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires. Unfortunately, it took a massive breach of healthcare-record data to give us a clearer picture, but let's take a closer look at what we can glean from the incident.
Posted on Wednesday August 31, 2016 | tool, smb, small, skype, sized, security, medium, function, for, cloud pbx, business
Skype for Business (as hinted in the name), is the corporate-oriented version of Skype. Besides the snazzy title, Skype for Business possesses unique office applications that will benefit your company. Yet, many business owners pose the same question: how important is it to adopt Skype for Business? Here are three reasons that might help you embrace Skype for Business a tiny bit easier.
Posted on Thursday July 07, 2016 | security, scalability, hybrid cloud, cloud computing
Who would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, "cloud" computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to something known as the "hybrid cloud."
Page: 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647