Blog Archive
Creating a Scalable Enterprise with Cloud Technology
The speed of change in today’s marketplace gives an advantage to businesses that adapt quickly to market conditions. Cloud computing gives businesses the flexibility to grow or shrink their IT use as their needs change. Easy scalability means these companies never pay for more than they need. What is cloud computing? Switching to a […]
How To Plan for Your Server Migration
Server migration can be very challenging especially for small- and medium-sized businesses (SMBs) who have complex server structures and large databases. Moving data is easy. The challenge is moving the applications and database structures that makes migration complicated. Making a Server Migration Plan A good plan is the best way to ensure that your organization […]
Protect Your Android Phone from the Stagefright Hack
Due to broad device compatibility for the OS and a strategy that focuses on the OS and not the hardware, Android holds nearly 80% of the mobile smart-phone market share. The downside of holding the mobile software market majority is that when a device-agnostic and OS-specific vulnerability is exposed, the user-base impact and potential PR-backlash […]
New OS, New Malware: Windows 10 Ransomware Scam
Just two weeks after its release, Windows 10 has already been installed for free on more than 70 million PCs. Microsoft is pulling all the stops to make the OS as appealing as possible. It even released a Windows 10 media creation tool to make upgrading to the new OS easier. Unfortunately, all the hype has also […]
2015 Top Tech Focus is Data Security – What you Need to Know
There was a time when data breaches like hacking or cyberattacks were rare and the stuff of science fiction – encountered by the average person only in movies, in comics and on TV. Fast forward a technical blip – a mere decade or so – and we see data breaches as a common concern and […]
Cybersecurity: Identity and Access Management
These days, most businesses take cybersecurity seriously. They are aware of the consequences of sloppy cybersecurity: a devastating data breach; a drop in customer confidence; damage to the brand. However, taking cybersecurity seriously is just the first step. Taking action is the second. Identity and Access Management (IAM) is a key component of strong cybersecurity […]
What’s after Windows Server 2003
The day has come and now gone. On July 14, 2015, Microsoft ended all support for Windows Server 2003. This means that users of Server 2003 now no longer receive patches, no longer expect fixes, and now can watch the queue of server vulnerabilities steadily increase. If you are still on the unsupported 2003 server, hear this […]
Zooming in on Big Data
“Big Data” has completely changed the landscape of doing business. It’s really a story of a few leaders adopting data as a tool and the industry falling into line thereafter. Google, eBay and LinkedIn were some of the first to orient their organizational strategy around driving business intelligence through increased data quantity, quality and variety. This drove […]
Fitting Managed Services to Your Business: QuestCare MSP, Remote, and PPM
Find the support you need to fill the gaps in your IT department. Having a competent and reliable IT staff has never been more important. In the past, the efficiency and effectiveness of your technology infrastructure (and how you leverage your IT department’s collective skills) were areas in which market leaders or the more savvy market entrants would […]
Microsoft Edge Review
Goodbye, Internet Explorer. After scrapping their much maligned browser, Microsoft will rollout a completely rebuilt browser named Microsoft Edge which Microsoft hopes will bring with it an equally rebuilt reputation and perception. Edge promises to be faster, cleaner and more intuitive than IE, and will become the default browser for Microsoft’s newest operating system, Windows 10. Users can still use […]