What’s the Magic Password?

Password policies are no laughing matter.  As websites continue to be breached each year, often by increasingly sophisticated hackers, it is more important than ever that administrators create and enforce strong password policies in their organization.  Additionally, users must be educated on what constitutes a strong password, so they can help be part of the solution rather than adding to …

Don’t Become a Victim: Update Your Web Browser

Microsoft recently made an “end-of-life” announcement that impacts older versions of its web browser (specifically Internet Explorer 8, 9 and 10).  Effective January 12, all versions of Internet Explorer, except for the current version 11) will no longer be supported by Microsoft.  For PC users still running these outdated web browsers, you’ve probably noticed that your older versions of Internet …

The Best of Both Worlds: Hybrid Cloud Solutions

As the debate over the merits (and pitfalls) associated the public cloud versus the private cloud continues, we are here to give you an alternate solution worth considering: the hybrid cloud.  While public clouds offer benefits such as cost savings, ease of use and scalability, private cloud computing is valued for its unrivaled security and control. But you no longer …

What Every CEO Needs to Know About Cybersecurity

Believe it or not, many C-suite executives are woefully uninformed when it comes to cybersecurity.  According to a survey recently commissioned by the cybersecurity experts at CyberArk, most CEOs are not regularly briefed on cybersecurity issues and the business risks associated therewith.  Yet it is clear that breaches and data loss headlines have a significant and pretty immediate impact on …

Mac Users Beware…

For decades, Mac users were proud to tout that their computers were more or less impervious to viruses and malware attacks.  But as Macs have become increasingly popular, there has been a simultaneous and unprecedented rise in Mac OS X malware.  According to security researchers at Bit9 + Carbon Black, the number of Mac-based malware infections in 2015 is at …

The Surprising New Surface Book

When was the last time you looked at your latest generation iPad and thought it was time to upgrade to a Microsoft product?  If you’re like most people, Microsoft has never really been on your radar for laptop and tablet technology.  But that’s all about to change with the recent debut of Microsoft’s Surface Book.  Featuring a detachable screen for …

What Defines Success in Cloud Strategy

As cloud technology becomes more prevalent in today’s corporate technology, it becomes more important to understand how to determine a successful migration to the cloud. Although the cloud is no longer a new topic, the evolution process is still in its infancy for most organizations. In theory, moving to the cloud can seem like a “no brainer” but like many …

What is IT Security?

With every new day there seems to be a new story about a company’s information being hacked. Whether it is retailers, such as Target or Home Depot, or companies who we would think have stronger security measures such as Anthem Insurance or the recently hacked Scottrade online brokerage, it seems as if no company is immune from a security breach. …