Online community building for businesses

What do circuses, the Internet and Harry Potter fans have in common? They are all communities that house numerous individuals sharing experiences and showing support on a common interest that defies geographical limitations. The 21st Century is an age where information reaches thousands in mere seconds, and what that can do for your business is…

Defense in Depth Part II

In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences involve human error. Ashley Schwartau…

The three types of client virtualization

According to a Research and Markets report, client virtualization is expected to drive continual growth in the IT sector. Long gone are the days of tedious one-on-one interaction between servers and systems, it is now time to embrace the automated and virtualized alternative. Mainly, there are three options and here they are: Presentation virtualization As…

Threat alert: self-replicating ransomware

The worrisome rise of ransomware doesn’t seem to be slowing as Microsoft recently announced the detection of self-propagating iterations of the malware. With this evolution, it is essential for SMBs to update their understanding of this security threat in order to properly protect themselves. Keep reading to learn how ransomware is continuing to extend its…

Defense in Depth Part 1

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t map every…

Reminder: Basic Password Tips

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords. There are many ways data can be breached, and opening some link they shouldn’t is one of the most serious security sins employees can…

Android’s newest user interface features

The I/O conference is a chance to learn about everything new and exciting that Google is working on, and some of the new Android features are that, and more. Traditionally, operating system updates can range from barely visible interface tweaks to unavoidable features, and these are no different. Read on to see if any of…