Over time, you may find that your current cloud-storage system is no longer meeting your needs as well as it had in the past. Perhaps you want better pricing or...
Read More
Back in February 2016, it was reported that Hollywood Presbyterian Hospital had become the latest high-profile victim of a cyber-attack. Hackers had gained control of the hospital’s network and encrypted...
Read More
What is downtime? Simply put, downtime is an interruption of your business. This interruption can be caused by a multitude of factors, both internal and external. How downtime affects your...
Read More
Many business owners and “less technical” people in management think “data backups” are enough to protect their organization. But when an outage occurs from equipment failure the recovery can be...
Read More
The prevalence of online security threats to data or identity lurks in the back of many internet users’ minds. The suspect could be a link in an email from an...
Read More
In today’s world, the use of smart devices is widespread across all economic levels of society. So too, the theft of smartphones and other small portable devices is on the...
Read More
This post is the latest in a series about how small business owners can prevent scams and fraud in the workplace. The first thing to know about fake antivirus is...
Read More
This post is part of an ongoing series about how small business owners can prevent scams and fraud in the workplace. According to Wikipedia, “'Malware' is an umbrella term used...
Read More
What is patching? Patching is another term for software updates. According to Wikipedia, a patch is “a piece of software designed to update a computer program or its supporting data,...
Read More
The end of the calendar year is the perfect time to block out an hour (or a few hours) to blow the dust off your Disaster Recovery Plan and update...
Read More