Blog Archive

Creating a Scalable Enterprise with Cloud Technology

  The speed of change in today’s marketplace gives an advantage to businesses that adapt quickly to market conditions. Cloud computing gives businesses the flexibility to grow or shrink their IT use as their needs change. Easy scalability means these companies never pay for more than they need. What is cloud computing? Switching to a […]

How To Plan for Your Server Migration

Server migration can be very challenging especially for small- and medium-sized businesses (SMBs) who have complex server structures and large databases. Moving data is easy. The challenge is moving the applications and database structures that makes migration complicated. Making a Server Migration Plan A good plan is the best way to ensure that your organization […]

Protect Your Android Phone from the Stagefright Hack

Due to broad device compatibility for the OS and a strategy that focuses on the OS and not the hardware, Android holds nearly 80% of the mobile smart-phone market share. The downside of holding the mobile software market majority is that when a device-agnostic and OS-specific vulnerability is exposed, the user-base impact and potential PR-backlash […]

New OS, New Malware: Windows 10 Ransomware Scam

Just two weeks after its release, Windows 10 has already been installed for free on more than 70 million PCs. Microsoft is pulling all the stops to make the OS as appealing as possible. It even released a Windows 10 media creation tool to make upgrading to the new OS easier. Unfortunately, all the hype has also […]

2015 Top Tech Focus is Data Security – What you Need to Know

There was a time when data breaches like hacking or cyberattacks were rare and the stuff of science fiction – encountered by the average person only in movies, in comics and on TV.  Fast forward a technical blip – a mere decade or so – and we see data breaches as a common concern and […]

Cybersecurity: Identity and Access Management

These days, most businesses take cybersecurity seriously. They are aware of the consequences of sloppy cybersecurity: a devastating data breach; a drop in customer confidence; damage to the brand. However, taking cybersecurity seriously is just the first step. Taking action is the second. Identity and Access Management (IAM) is a key component of strong cybersecurity […]

What’s after Windows Server 2003

The day has come and now gone. On July 14, 2015, Microsoft ended all support for Windows Server 2003. This means that users of Server 2003 now no longer receive patches, no longer expect fixes, and now can watch the queue of server vulnerabilities steadily increase. If you are still on the unsupported 2003 server, hear this […]

Zooming in on Big Data

“Big Data” has completely changed the landscape of doing business. It’s really a story of a few leaders adopting data as a tool and the industry falling into line thereafter.  Google, eBay and LinkedIn were some of the first to orient their organizational strategy around driving business intelligence through increased data quantity, quality and variety.  This drove […]

Fitting Managed Services to Your Business: QuestCare MSP, Remote, and PPM

Find the support you need to fill the gaps in your IT department. Having a competent and reliable IT staff has never been more important. In the past, the efficiency and effectiveness of your technology infrastructure (and how you leverage your IT department’s collective skills) were areas in which market leaders or the more savvy market entrants would […]

Microsoft Edge Review

Goodbye, Internet Explorer. After scrapping their much maligned browser, Microsoft will rollout a completely rebuilt browser named Microsoft Edge which Microsoft hopes will bring with it an equally rebuilt reputation and perception. Edge promises to be faster, cleaner and more intuitive than IE, and will become the default browser for Microsoft’s newest operating system, Windows 10. Users can still use […]