How to minimize risks after a data breach

Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats. Determine what was breached Whether its names, […]

Fighting ransomware with virtualization

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions. Virtual […]

Big gains for small-business IT in 2017

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most […]

Who are the ShadowBrokers?

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? […]

Why is Windows XP getting updates?

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons. […]

NSA-approved: mobile virtualization

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security. Here’s what you need to know: US government approved The NSA maintains a […]

Web browser cybersecurity, ranked

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start. Learn more about how your browser choice stacks up in your security comparison. […]

Predictability coming to Windows 10 updates

Updates to the Windows operating system have a controversial reputation. On the one hand, Microsoft issues them frequently to combat cybersecurity risks and introduce new features. On the other hand, the update frequency and requirements leave some users feeling like it’s impossible to keep up. The most recent announcement from Microsoft is working to address […]

What is virtual “sandboxing”?

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it’s worth learning about. What is sandboxing? Sandboxing is one of the rare concepts in virtualization […]

Denial of service attacks on VoIP systems

When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the biggest threats to these systems […]