Managed Services Providers (MSPs): What They Do and Why You Need Them.
For most organizations, IT is ‘plumbing’ – you know you need it, and it needs to work, but you’d rather not have to roll up your sleeves to work out how to flush your caches or fix that data leak! Managed Services Provider’s (MSPs) are technology consultants who take away … Read More
Cloud Computing Services: Migrating Systems to the Cloud
Here’s a scenario where Cloud Computing Services can provide value-add for your company… Imagine a small Milwaukee video production company’s editor filtering through a network of drives, looking for the right clips to complete a teaser video for his new client. Burning the midnight oil to complete a project due … Read More
Is Cyber Insurance a Necessity or a Luxury?
Many of us view insurance as a necessary evil. We loathe paying the premiums, but we all deal with it at some point—whether it’s health insurance, car insurance, homeowners/renter’s insurance or some other type of insurance. Add one more type of insurance to the list, now there is cyber insurance … Read More
Minimise the risk of ransomware with these 10 effective methods.
Ransomware is a type of virus/malware that restricts access to an infected computer (by encrypting the files) and requires the person pay a ransom to the malware operators to remove the restriction and gain access to those files again. The risk of ransomware attacks is an increasingly popular security concern … Read More
Is Microsoft’s Windows cloud strategy a case of Azure-based frog boiling?
Microsoft have said that they’re a “mobile first, cloud first” company these day. Windows 10 represents the first wave of the new world, and already there are signs that a cloud strategy lies firmly underneath some of the more questionable aspects of the operating system. There are approximately five billion … Read More
Protecting your data from Ransomware: Cryptolocker and Locky
As an IT service provider, there is no more chilling phone call from a client as “The accounting system is broke and we cannot open our Microsoft Office files either.” A quick login and file check stumbles upon some of the worst evidence of a ransomware attack as you could … Read More
Google Chrome – “Class Not Registered” error
I recently ran into a situation where one of our school customers was planning on doing some standardized testing (the FORWARD exam) and the Google Chrome browser application they needed to use for the testing suddenly wouldn’t start for a number of users. The error was: I had not seen … Read More
Is your data protection policy protecting your employees and students?
It seems like a regular occurrence these days that we’re hearing about a company’s employee records or customer data getting stolen by hackers. Well-known companies like Blue Cross/Blue Shield, Home Depot, Target, Anthem Insurance, and others have fallen prey to data protection breaches that resulted in private information getting stolen. … Read More
The top Security Trends to watch for in 2016
In this article we look at some key Information Security trends to look for as we begin 2016, along with the things you need to consider if you want to stay ahead of the curve… It should come as no surprise that the stakes for information security have been steadily … Read More
Does 802.11ac Wave 2 wireless require replacing your old copper cabling?
The short answer to that question is, no. Explaining why however, that’s where things get really interesting… It’s also one of those explanations that requires a person to understand the real-world throughput in real-world scenarios for wireless environments, instead of just listening to all the marketing buzz and fancy technical … Read More
How web browsing is crippling your infrastructure & compromising security
Ask anyone what the most resource-intensive applications on their end-user devices are, and you will normally receive a laundry list of software with heavy graphical or number-crunching output. ArcGIS, Solidworks, Google Earth, AutoCAD – these are normally the sorts of culprits one would normally expect a systems administrator to name … Read More