
Backups Vs. Redundancy – Know The Difference
When data is destroyed, the consequences for a business can vary widely, from a brief period of recovery to a catastrophe that spells the death of the company. It’s clear
When data is destroyed, the consequences for a business can vary widely, from a brief period of recovery to a catastrophe that spells the death of the company. It’s clear
An estimated $4 trillion was spent worldwide on information technology in 2019. Still, many firms find it challenging to keep up with the latest technology and IT security. Small and
You might remember that old saying, “When all you have is a hammer, every problem looks like a nail”. In cybersecurity, many folks only see nails. Often, I hear CEOs
As most of us begin another week of working from home, online communication platforms like Zoom and GoToMeeting are exploding with many new customers. As we reviewed some essentials to
Companies all over the US have their employees working from home for the foreseeable future (schools have also shut their doors). The problem? Most organizations have not implemented work from
With the recent news that non-critical businesses will not be opening their physical locations during this period of quarantine, you’re probably wondering—especially if you haven’t had to run and manage
You might be wondering why I’m bringing up processor chips as a topic for this week’s blog. But as we get into addressing Windows 7 chaos—that is, the end of
Think of the last time you had an emergency and needed to get rushed to the hospital ASAP. Maybe it was a heart attack, perhaps you had an appendix giving
One thing is very clear—most healthcare organizations DO make sure that their HIPAA security checklists are taken care of. BUT many are using the WRONG evaluation to do so. When
The past couple of weeks, we went through some considerations with the Internet of Things (IoT for short). One major consideration that has been persistent throughout the world of IoT