DRaaS and What Really Happens

Posted by Rachel Tse on August 3, 2018 at 1:07 PM

Disaster Recovery is essential during this time of the year. Unfortunately, hurricane season is already here and preparing for it is important. For businesses, DRaaS may be a solution that you have heard of, but what is really going on behind the scenes?

Read More

Tags: threat, cloud, learn

3 Innovations That Tackle The Password

Posted by Rachel Tse on July 27, 2018 at 1:07 PM

Without a doubt, passwords are one of the main challenges of day to day life. There is a constant struggle between wanting to keep your information secure, but also creating a password that is easy to remember among the hundreds you've already created.

Read More

Tags: cybersecurity, security, update

"...As A Service" Infographic

Posted by Rachel Tse on July 20, 2018 at 11:03 AM

What does "...as a Service" mean and whats it got to do with cloud computing?

Read More

Tags: cloud, learn

5 Signs You're Being Phished (with Examples)

Posted by Rachel Tse on July 13, 2018 at 11:03 AM

If you're not familiar with the term phishing, you might be more familiar with the Nigerian Prince Phishing email back in 2016 and its alleged perpetrator's arrest last year. Though it's dubbed "the butt of late night jokes" by the FTC, phishing in general has taken a serious turn.

Read More

Tags: IT, security, learn

The Cloud and Different Types of Clouds Explained...

Posted by Rachel Tse on June 29, 2018 at 2:23 PM

Cloud has been around, but what really is it and why should I use it?

You've probably heard of the term "the cloud" thrown around like it is something that's been around for a while, but what does it really mean when they say "Using the cloud could lead to a lot of advantages for a lot of businesses."?

Read More

Tags: Insider, cloud, learn

5 Tips You Can Do To Secure Your Customer Data

Posted by Rachel Tse on June 15, 2018 at 1:13 PM

If you haven't heard, the EU's General Data Protection Regulation (GDPR) was applied to all EU nations, Friday, May 25th, to increase personal data security of its citizens. This means that GDPR compliance is also expected from businesses that provide products or services to customers or businesses within the EU. Compliance could include:

  • Pseudonymizationkeeping personal data separated to prevent user identification
  • Complete transparency with the customer

Businesses are required to tell users what data is on them, when their data is breached and how to access their data.

Read More

Chrome 68 Update Could Mark Your Site As "Not Secure"

Posted by Rachel Tse on June 8, 2018 at 10:00 AM

Chrome 68 is set to come out starting July 2018 and could have serious implications for businesses still running their sites on HTTP. This includes not only losing site traffic, but also driving away customers and prospects. The solution to preventing this issue is HTTPS.

Read More

Tags: security, Chrome, update, offer

The Equifax Hack: What We Learned & What You Can Do

Posted by Shruthika Kamat on September 26, 2017 at 2:20 PM

 Earlier this month, consumer credit rating company Equifax notified consumers of a major theft of personally identifiable information (PII). The Equifax breach affected nearly 143 million Americans making Equifax the target of much scrutiny as analysts question their web application security.

Read More

Tags: cybersecurity, threat, hacker, IT, Equifax, hack, security, web application

A 3 Point Approach to Security Automation

Posted by Shruthika Kamat on September 1, 2017 at 12:41 PM

The recent WannaCry ransomware worm hit an estimated 74 countries worldwide and affected more than 550,000 total computers – 60,000 in just its first day. And now Petya is following in Wannacry’s footsteps, exploiting the same Windows vulnerability to get infosec pros scrambling again. With high impact attacks becoming faster and more sophisticated than ever, security needs to evolve as well. And the best way to even the playing field is through security automation.

Read More

Tags: fortinet, cybersecurity, threat, IT

The Best Way to Beat a Hacker is to Think Like One

Posted by Shruthika Kamat on August 22, 2017 at 12:13 PM

In today’s threat environment, focusing on prevention alone is no longer a sufficient strategy. In 2016, there were 40% more reported incidents of data breaches compared to 2015. Experts anticipate that the number of incidents will increase further in 2017.

Read More

Tags: small business, fortinet, cybersecurity, threat, management, hacker, IT

Keep up with the latest in tech trends!

Explore our blog to learn more about how the cloud can benefit your business, the importance of cybersecurity, and how a managed services provider can benefit YOU.

Want more?

Recent Posts