1605, 2018

How much does Apple know about you?

By |May 16, 2018|Categories: Apple|Tags: , , , , , |

Google. Facebook. Amazon. These tech giants collect data from us the moment we sign up for their products and services. Some information we willingly surrender (like our name and email address) and others they collect from the services we use (like the sites we visit or the people we contact). [...]

105, 2018

The Facebook data breach scandal explained

By |May 1, 2018|Categories: Security|Tags: , , , , , , , , |

Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn't guard the information you've given it? How does this affect its users? Last month, news broke that a firm known as Cambridge [...]

2304, 2018

The management drawbacks of virtualization

By |April 23, 2018|Categories: Virtualization|Tags: , , , , , , |

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating [...]

904, 2018

3 ways to ensure your FB data is private

By |April 9, 2018|Categories: Social Media|Tags: , , , , , , , |

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your [...]

204, 2018

Cybersecurity approaches to keep PHI safe

By |April 2, 2018|Categories: Healthcare|Tags: , , , , , , , , |

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough. They also need to implement the most advanced systems and protocols to [...]

2903, 2018

Ready for tax season phishing scams?

By |March 29, 2018|Categories: Security|Tags: , , , , , , , |

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark [...]

2709, 2017

How SaaS can benefit your business

By |September 27, 2017|Categories: Web & Cloud|Tags: , , , , , |

As technology progresses, more solutions are created to help businesses reduce costs and increase efficiency. One such solution is “Software as a Service,” aka SaaS. To know if this new solution can be of benefit to your business, you need to know first what SaaS actually is. Read on to [...]

3006, 2017

How 5G data will change VoIP

By |June 30, 2017|Categories: VoIP|Tags: , , , , , , , , |

Our craving for data seems to increase every year, fueling the constant advancements in wireless technology. The latest is 5G, an abbreviation for the fifth-generation wireless systems, and it is set to transform VoIP for the better. Here are three ways it will do that. Improved video conferencing The major [...]

3003, 2017

Does Optane SSD deserve your data?

By |March 30, 2017|Categories: Hardware|Tags: , , , , , , |

This month, Intel unveiled a revolutionary new type of hard drive that can work as either a storage or RAM unit, while offering faster performance than most hard drives in the market. Its performance and technical capabilities make it appealing for a wide range of applications, but is it worth [...]

709, 2016

Fantom: the latest cybersecurity spectre

By |September 7, 2016|Categories: Windows|Tags: , , , , , , , , , , , , , |

It’s hard to deny how quickly the different types of ransomware multiply -- they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would [...]

Go to Top