The BYOD debate is becoming old hat for many mid-market organizations. Some mid-markets have defaulted to allowing their employees to 'Bring Your Own Device' and have accepted some risks.
Small and Medium Business (SMB) leaders need to develop an IT Strategic Plan even if you do not even have an IT department.
If you have a perfect storm of deleted data and no backup, usually the IT department is to blame. Sounds familiar?
This article clears up the difference between a vulnerability scan and a penetration test. Learn how they have different uses but also compliment each other.
Soon after Windows Server Active Directory transitioned into the "cloud" in 2011, Azure Active Directory emerged as its powerful cloud extension offering scalable identity management solutions supported by unified disaster recovery.
In your private cloud (private datacenter or rented rack), industry standard hardware includes tons of built-in monitoring and diagnostic features which may not be configured.
As a Small or Medium Business (SMB) you may be wondering how you can finally break into cloud computing in a way that provides a great all-around solution that is also scalable and provides a predictable cost. When looking for a solution to network, storage, computing, backup and app ecosystems there are few options that cover all these bases as well as Microsoft Azure.
Social Media has impacted our lives. Social engineering is a modern attack that can exploit those executives with low security awareness.
The new innovation, which will be included in Microsoft Office 365, is named “Skype for Business". This provides a captivating new client experience. Skype for Business will change the way traditional business is being done. It will incorporate the modern experience business leaders strive for.
In this era of remote management, e-mail alerts and advanced monitoring features, we can never forget the basics.
In the area of disk to disk backups, we have customers using tapes for archival or retention purposes.
Congratulations, you have completed a time-consuming disaster recovery test and you have achieved your target RTO and RPO. The DR Plan is well documented. Don't lay it to rest hoping it will work when it is needed the most. Keep your DR plan alive.
Businesses struggle with IT and security because of the rapid pace at which security flaws are discovered and how fast technology in software and hardware are progressing.
Several advanced DNS providers (EasyDNS, DNS Made Easy, etc) provide URL forwarding functionality through the use of a “DNS” record.
One of the most prevalent white hat (and black hat) security tools available is a Linux distribution called Kali Linux. It includes many security scanning, analysis and penetration tools which come preloaded.
A Security Incident Response policy and procedure depends on the business impact related to the incident types. Having a security incident that costs the business millions of dollars must be treated quicker and with more attention to detail to others which are less severe.
This article attempts to clear up the confusion between Authentication and Authorization. They often seem to occur together and seamlessly on a Windows network, but they must be managed separately.
Surveillance software on a mobile phone is one of the most dangerous means of attack. This can be downloaded either form the app store or through a text message.
One of the downfalls of early wireless technology (WEP) is that it suffered many flaws that allowed an attacker to gain access to your network or the ability to read the “encrypted” data stream. Since some older home devices (TiVo's, etc.) do not support WPA or WPA2 encryption, these homes may still be using this outdated encryption scheme.
Defense in Depth helps ensure an organization can prevent or minimize a security breach. This is accomplished by implementing many layers of defense against the progression of an attack.
The basic form of a smart card is something you might see inside your cell phone or PC. Most service providers use a smart card / sim card in order to activate on their network. Some service providers that use smart cards are T-Mobile, AT&T and Sprint.
When we think of a web servers we most commonly think of them being published to the Internet. It is also common for organizations to have internal web servers presenting internal web apps.
Many organization frown upon the use of the "cloud" because they are reducing control compared to a traditional network architecture. One of the biggest fears many organizations hold with cloud offerings if the inability to have complete control over your data or knowing who has access.
The debate about password strength, length and complexity goes back for decades. Many organizations don’t enforce strong enough passwords to mitigate the risk of password cracking.
When IT admins receive a file restore request after an “accidental” file deletion, there may be no answer available as to who deleted the file. The file is typically restored from last night’s backup and the ticket is closed. The root cause of the issue is never found out: Who deleted the file (and Why)?