2610, 2018

Is your IT security proactive?

By |October 26, 2018|Categories: Security|Tags: , , , , , |

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you [...]

1710, 2018

How to prevent VoIP threats

By |October 17, 2018|Categories: VoIP|Tags: , , , , , |

Now that digital collaboration is an integral part of any business, VoIP has become indispensable. Unfortunately, as it becomes more widespread, so do the threats against it. These attacks may not be as serious as ransomware or phishing, but they’re just as dangerous to SMBs. Here are five ways to [...]

1503, 2017

Firewalls: hardware vs. software

By |March 15, 2017|Categories: Hardware|Tags: , , , , |

Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by promises of quick and easy solutions that can be installed and managed right from your desktop. In the software vs. hardware debate, there’s a clear winner when it comes to [...]

1502, 2017

What exactly is preventive cyber-security?

By |February 15, 2017|Categories: Security|Tags: , , , , , |

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive [...]

2609, 2016

VMware’s Project Goldilocks: what is it?

By |September 26, 2016|Categories: Virtualization|Tags: , , , , , |

Almost every day, the virtualization industry takes a giant leap forward. Although this industry has been reserved for only the most technologically advanced of businesses over the years, it’s spreading like wildfire with advances in cloud computing. As engineers create virtual versions of hardware, storage, and even networks, digital architects [...]

Go to Top