Blog

DR tips for floods and hurricanes

The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive.

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.

What is it?

Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.

Why are businesses using VoIP?

VoIP phone systems have come a long way from the early days of glitchy calls and limited features. Today, they’re an integral part of small- to medium-sized businesses’ telecommunications strategies. But what exactly are they and what benefits can they bring your business?

What is VoIP?

VoIP, or Voice over Internet Protocol, is a technology that allows you to make and receive calls over the internet.

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.

What is Amazon AppStream 2.0?

Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever.