Planning for Disaster Recovery
We don’t like to think about disasters, but preparing for them is better than ignoring them. FEMA estimates that 40% of businesses that experience a
We don’t like to think about disasters, but preparing for them is better than ignoring them. FEMA estimates that 40% of businesses that experience a
You may have encountered the term “whaling” when IT people talk about spam email. It’s like phishing, but it directs its bait at really big
Since September 2013, when the ransomware plague was unleashed on the internet in the form of CryptoLocker and its copycats, to the time of this post, there
There are many key factors to having a successful environment in the workplace, and being productive is one of the most essential. Not only do
Consumers and companies are taking advantage of the proliferation of remote desktop protocol (RDP) to access content, save data, proxy web surf, use different programs,
Think of social engineering as analogous to how the Greeks conquered the walled-city of Troy. Troy to the siege technology of the day, so the Greeks
You’re at work one day, minding your own business, when a huge man walks in through the front door. He’s wearing an expensive overcoat, but
An information archive is a collection which has long-term usability. It can serve many different purposes: research, compliance with the law, reference, documentation, and the
On the news and in the technology world, there has been a lot of recent talk about ransomware. This big jump in notoriety is due
Bandwith is a key currency for modern homes, businesses and public areas. More of life is centered around the connection to the internet and the