[vc_row][vc_column][vc_column_text]As Microsoft prepares to end support and updates for its Small Business Server 2003, many professionals are exploring the cloud-based Office 365 as a potential replacement. The idea of switching from a platform with which you are...
Blog
Keeping up with Employee Demand for BYOD
[vc_row][vc_column][vc_column_text]If you have not adopted a Bring Your Own Device (BYOD) policy for your business, you may no longer have the luxury of delaying. According to the article, Business trends for 2015: the mobile workforce and BYOD maturing, employee...
What Does the End of SBS 2003 Mean For Me?
[vc_row][vc_column][vc_column_text] If you've been relying on Windows Small Business Server 2003 to manage your company's IT infrastructure, it's time to begin investigating other options. Beginning on July 14, 2015, Microsoft will end support for the mainstay OS, and...
Ransomware: To Pay or Not To Pay the Ransom?
[vc_row][vc_column][vc_column_text]The following post was featured on TechTarget SearchSecurity earlier this week and is being shared as we have many clients who have asked us this hypothetical question, in the hopes that the day doesn't come that they have to know...
The State of Healthcare IT Security in 2015
[vc_row][vc_column][vc_column_text]Have you had time to research IT security and how it can impact your healthcare company? If you haven’t, don’t worry, we’ve identified some of the risks and have listed some suggestions to help you get started: 1. Almost Half of All...
5 Astonishing Data Security Mistakes Law Firms of All Sizes Make
[vc_row][vc_column][vc_column_text] While law firms have made significant progress in closing data security gaps, they’re still far from perfect. Take a look at some of these common mistakes many make: 1) Not Knowing Where Your Cloud Computing Services Provider Stores...
Rombertik Identified by Cisco as a New Suicide Virus
[vc_row][vc_column][vc_column_text] Rombertik is a new malware that is making data security headlines, as it collects everyday data you may enter into websites. It specifically targets collecting the data that users type in fields on websites, such as usernames,...
BYOD: Companies are inviting staff to bring their own computer to work
[vc_row][vc_column][vc_column_text]What is BYOD? Bring Your Own Device (BYOD) is a growing trend that is helping many businesses to expand their worktime coverage and reduce costs. The concept is simple: rather than employees only using business owned computers and...
2015 Data Security: The Rise of Hacking Campaigns
[vc_row][vc_column][vc_column_text]Even though technology makes it harder for criminals to do their work, it’s not bullet-proof. In fact, there are many criminals equally as innovative as their private industry counterparts. So they’re fast at developing new methods...
‘Ransomware’ a Growing Threat to Small Businesses
[vc_row][vc_column][vc_column_text]I came across an interesting article in the Wall Street Journal regarding recent advancements by cybercriminals to attack small businesses with ransomware, and essentially use malware in bogus emails to freeze SMB computer files, and...