Tag Search: security

Social engineering and cyber security

Posted on Friday October 07, 2016  |  social engineering, security, phishing, cybersecurity

2016october7_security_aSocial engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.

 

9 essential cybersecurity phrases

Posted on Wednesday September 21, 2016  |  zero day attack, security, ransomware, phishing, patch, malware, cyber attackers

2016september21_security_aAs with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you're looking for a list of the industry's most relevant terms, you've come to the right place.

 

VMware releases security patches

Posted on Thursday September 08, 2016  |  vmware, virtualization, security updates, security, patches

2016september8_virtualization_aSometimes technology solutions seem safer merely because they're not widespread enough to be a lucrative target. Although increasingly popular, virtualization's resilient protection protocols and low adoption rates tend to offset the cost vs. benefit considerations of creating an exploit. Or at least, that was the case. Late last month VMware announced an update to patch a gap that allowed attackers to compromise virtualized cloud infrastructures. We've compiled everything you need to know to protect yourself here.

 

Record $5.5 million HIPAA penalty doled out

Posted on Monday September 05, 2016  |  security, medical data, hipaa, healthcare, emr, data compliance

2016September5_HealthcareArticles_AIf your organization hosts data regulated by the US government, you're familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires. Unfortunately, it took a massive breach of healthcare-record data to give us a clearer picture, but let's take a closer look at what we can glean from the incident.

 

Skype for Business and its benefits

Posted on Wednesday August 31, 2016  |  tool, smb, small, skype, sized, security, medium, function, for, cloud pbx, business

2016August31_VoIP_ASkype for Business (as hinted in the name), is the corporate-oriented version of Skype. Besides the snazzy title, Skype for Business possesses unique office applications that will benefit your company. Yet, many business owners pose the same question: how important is it to adopt Skype for Business? Here are three reasons that might help you embrace Skype for Business a tiny bit easier.

 

SMBs turn to hybrid clouds for flexibility

Posted on Thursday July 07, 2016  |  security, scalability, hybrid cloud, cloud computing

2016July7_Web_AWho would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, "cloud" computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to something known as the "hybrid cloud."

 

Page:   1234567891011121314151617181920212223242526272829303132333435363738394041424344454647

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016