Archive for Month: August 2015

  • How To Plan for Your Server Migration

    Server migration can be very challenging especially for small- and medium-sized businesses (SMBs) who have complex server structures and large databases. Moving data is easy. The challenge is moving the applications and database structures that makes migration complicated. Making a Server Migration Plan A good plan is the best way to ensure that your organization […]

    Read More…

    Read More
  • Protect Your Android Phone from the Stagefright Hack

    Due to broad device compatibility for the OS and a strategy that focuses on the OS and not the hardware, Android holds nearly 80{61194e7afa0946242429d3457858805d5d8e9f1e3c2fa6ff4cb841084e122ca3} of the mobile smart-phone market share. The downside of holding the mobile software market majority is that when a device-agnostic and OS-specific vulnerability is exposed, the user-base impact and potential PR-backlash is all […]

    Read More…

    Read More
  • New OS, New Malware: Windows 10 Ransomware Scam

    Just two weeks after its release, Windows 10 has already been installed for free on more than 70 million PCs. Microsoft is pulling all the stops to make the OS as appealing as possible. It even released a Windows 10 media creation tool to make upgrading to the new OS easier. Unfortunately, all the hype has also […]

    Read More…

    Read More
  • 2015 Top Tech Focus is Data Security – What you Need to Know

    There was a time when data breaches like hacking or cyberattacks were rare and the stuff of science fiction – encountered by the average person only in movies, in comics and on TV.  Fast forward a technical blip – a mere decade or so – and we see data breaches as a common concern and […]

    Read More…

    Read More
  • Cybersecurity: Identity and Access Management

    These days, most businesses take cybersecurity seriously. They are aware of the consequences of sloppy cybersecurity: a devastating data breach; a drop in customer confidence; damage to the brand. However, taking cybersecurity seriously is just the first step. Taking action is the second. Identity and Access Management (IAM) is a key component of strong cybersecurity […]

    Read More…

    Read More
  • What’s after Windows Server 2003

    The day has come and now gone. On July 14, 2015, Microsoft ended all support for Windows Server 2003. This means that users of Server 2003 now no longer receive patches, no longer expect fixes, and now can watch the queue of server vulnerabilities steadily increase. If you are still on the unsupported 2003 server, hear this […]

    Read More…

    Read More
Social media & sharing icons powered by UltimatelySocial