Information security depends on “our people” doing the right thing to protect our data, but too often the security measures we implement force our people to go around them to get [...]
Keeping up with software releases is important, especially when the software is Microsoft Windows and it’s the foundation of your entire information technology infrastructure. Windows 10 [...]
Protecting data in the cloud remains one of the biggest challenges for companies that have moved their infrastructure to the cloud. Systems in the cloud use the same operating systems as systems [...]
In the rush to cloud, companies tend to focus on storage and compute infrastructure. Networking is an equally important part of your cloud architecture, and Azure provides many networking [...]
The increased use of mobile technology in business, combined with the Bring Your Own Device (BYOD) trend, means that businesses can’t neglect mobile device security. There are many sources [...]
The number of cybersecurity threats is almost infinite. There is no business that is too big or too small to need cybersecurity. Previously unimaginable cyber-attacks are occurring regularly and [...]
In many organizations, fax machines linger as dusty relics of a previous technological era. Some organizations aren’t even aware they have fax machines, the unused functionality built into [...]
When you move your infrastructure into the cloud, how will you move your backup process? You can’t rely on your cloud provider to keep backups for you—the vendor’s goal with backups [...]