Blog Archive
Protect Your Android Phone from the Stagefright Hack
Due to broad device compatibility for the OS and a strategy that focuses on the OS and not the hardware, Android holds nearly 80% of the mobile smart-phone market share. The downside of holding the mobile software market majority is that when a device-agnostic and OS-specific vulnerability is exposed, the user-base impact and potential PR-backlash […]
New OS, New Malware: Windows 10 Ransomware Scam
Just two weeks after its release, Windows 10 has already been installed for free on more than 70 million PCs. Microsoft is pulling all the stops to make the OS as appealing as possible. It even released a Windows 10 media creation tool to make upgrading to the new OS easier. Unfortunately, all the hype has also […]
2015 Top Tech Focus is Data Security – What you Need to Know
There was a time when data breaches like hacking or cyberattacks were rare and the stuff of science fiction – encountered by the average person only in movies, in comics and on TV. Fast forward a technical blip – a mere decade or so – and we see data breaches as a common concern and […]
Cybersecurity: Identity and Access Management
These days, most businesses take cybersecurity seriously. They are aware of the consequences of sloppy cybersecurity: a devastating data breach; a drop in customer confidence; damage to the brand. However, taking cybersecurity seriously is just the first step. Taking action is the second. Identity and Access Management (IAM) is a key component of strong cybersecurity […]
What’s after Windows Server 2003
The day has come and now gone. On July 14, 2015, Microsoft ended all support for Windows Server 2003. This means that users of Server 2003 now no longer receive patches, no longer expect fixes, and now can watch the queue of server vulnerabilities steadily increase. If you are still on the unsupported 2003 server, hear this […]
Zooming in on Big Data
“Big Data” has completely changed the landscape of doing business. It’s really a story of a few leaders adopting data as a tool and the industry falling into line thereafter. Google, eBay and LinkedIn were some of the first to orient their organizational strategy around driving business intelligence through increased data quantity, quality and variety. This drove […]
Fitting Managed Services to Your Business: QuestCare MSP, Remote, and PPM
Find the support you need to fill the gaps in your IT department. Having a competent and reliable IT staff has never been more important. In the past, the efficiency and effectiveness of your technology infrastructure (and how you leverage your IT department’s collective skills) were areas in which market leaders or the more savvy market entrants would […]
Microsoft Edge Review
Goodbye, Internet Explorer. After scrapping their much maligned browser, Microsoft will rollout a completely rebuilt browser named Microsoft Edge which Microsoft hopes will bring with it an equally rebuilt reputation and perception. Edge promises to be faster, cleaner and more intuitive than IE, and will become the default browser for Microsoft’s newest operating system, Windows 10. Users can still use […]
Server 2003 End of Service is TODAY.
We’ve been saying it for months. (Shouting it, in fact!) But for those of you who missed the message, please listen up now: Today, July 14th, 2015, Windows will end all support for Server 2003. If you’re still running Server 2003 and you haven’t done anything about it, it’s beyond time to get moving. You need […]
Triad Linux Users Group – July Meeting
Date: Tuesday, July 21st, 2015 Time: 6pm Location: Dynamic Quest HQ, 4821 Koger Blvd, Greensboro, North Carolina Learn More & Register Guilford County Linux Users Group is a LUG for the residents of Guilford County and surrounding areas. Among PC users, there is a growing interest in Linux, both in the area, across the nation, and around the […]