Malvertising: Why All Digital Ads are NOT Created Equal

When you are browsing the internet, do you think twice before you visit reputable sites such as the New York Times, MSN, Spotify, the Weather Network and the NFL?  If you answered “no” you’re definitely not alone, but in the age of malvertising, it’s important to know that virtually no website is completely safe anymore. Malvertising is an especially sneaky …

Are You Maximizing the Benefits of CRM?

Chances are, your business already uses some sort of CRM software to manage customer data, but in today’s marketplace, that’s just the bare minimum. Here are a few tips for maximizing the benefits of CRM to your business. Clean up your data regularly. Data is only valuable if it’s accurate and therefore it is important to have a process by …

Encryption: What’s the Big Deal?

You don’t have to be a tech junkie to have heard about the lawsuit between the FBI and Apple involving the iPhones of the San Bernardino shooters.  And while that specific matter seems to be more or less resolved (at least for now), the discussion surrounding encryption is here to stay.  In fact, amidst the FBI and Apple legal challenges, …

Dell + EMC: The implications

As part of the largest tech deal in history, Dell recently acquired EMC for $67 billion.  According to a Dell spokesperson, this tech conglomerate is now “exceptionally well positioned for growth in the most strategic areas of next generation IT including digital transformation, software-defined data center, converged infrastructure, hybrid cloud, mobile and security.” As a result of this deal, Dell …

Leveraging the Benefits of Hyperconvergence

If you are like many small and medium sized businesses, you would probably agree that legacy data centers have traditionally lacked efficiency and scalability without significant economic investment.  But with hyperconverged infrastructure businesses are able to cost effectively increase functionality and enhance business agility.  By delivering virtualization, storage, compute, network, management and data protection in a manageable and scalable application, …

An “App”-licable Trend

So your company has successfully adopted a Bring Your Own Device (BYOD) policy.  It’s a win-win, as employees are happy to use devices they actually want to be using and your business is realizing IT savings.  But along with BYOD comes an important discussion surrounding BYOA (Bring Your Own Application), as more and more employees are inclined to forego cumbersome …

What’s the Magic Password?

Password policies are no laughing matter.  As websites continue to be breached each year, often by increasingly sophisticated hackers, it is more important than ever that administrators create and enforce strong password policies in their organization.  Additionally, users must be educated on what constitutes a strong password, so they can help be part of the solution rather than adding to …

Don’t Become a Victim: Update Your Web Browser

Microsoft recently made an “end-of-life” announcement that impacts older versions of its web browser (specifically Internet Explorer 8, 9 and 10).  Effective January 12, all versions of Internet Explorer, except for the current version 11) will no longer be supported by Microsoft.  For PC users still running these outdated web browsers, you’ve probably noticed that your older versions of Internet …

The Best of Both Worlds: Hybrid Cloud Solutions

As the debate over the merits (and pitfalls) associated the public cloud versus the private cloud continues, we are here to give you an alternate solution worth considering: the hybrid cloud.  While public clouds offer benefits such as cost savings, ease of use and scalability, private cloud computing is valued for its unrivaled security and control. But you no longer …

What Every CEO Needs to Know About Cybersecurity

Believe it or not, many C-suite executives are woefully uninformed when it comes to cybersecurity.  According to a survey recently commissioned by the cybersecurity experts at CyberArk, most CEOs are not regularly briefed on cybersecurity issues and the business risks associated therewith.  Yet it is clear that breaches and data loss headlines have a significant and pretty immediate impact on …