Guest Post – What Proactive IT Maintenance Can Do For Your Company

A company’s information technology infrastructure is its most vital intangible asset. Maintaining assurance that every part of it is functioning well is key to running regular business operations. There are different approaches to system maintenance, but one that’s being highlighted now more than ever is proactive maintenance.

Proactive maintenance is a strategy that prioritizes finding the root cause of failure to prevent it from ...

Continue Reading →
0

Which Version of Office is Better?

Are you trying to figure out whether the “pay for it once and install it” version of Office (Office 2019) is better for you, or if the online, connected, “pay for it every month” subscription version is better (Office 365)?  Today’s guest post by Joey Pepka of Peptronics should help you decide.


Which Version of Office is Better?

Due to the installation methods, ...

Continue Reading →
0

Guest Post – Remote Desktop Protocol Users Have Highest Incidence of Ransomware Attacks

As more schools and businesses find themselves going online, Remote Desktop Protocol (RDP) users are more vulnerable than ever to a ransomware attack. Learn more about the latest threat from Drovorub malware, and what organizations can do to protect themselves.  This article is offered as a part of Cybersecurity Awareness Month, and the week two theme, “Securing devices ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Telework Essentials Toolkit

Original release date: September 30, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their ...

Continue Reading →
0

If You Connect It, Protect It

Keeping our connected devices secure has become easier – and harder!  Easier because we have more tools to defend our online assets, and harder because the opposition has grown much larger and become more sophisticated.  And the enemy is not limited to criminals, there are terrorist groups, nation-state sponsored cyber operations teams, hacktivists, and other with malicious intent and nefarious schemes.

When I started writing this blog in October 2006, almost ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Who is Tech Investor John Bernard?

John Bernard, the subject of a story here last week about a self-proclaimed millionaire investor who has bilked countless tech startups, appears to be a pseudonym for John Clifton Davies, a U.K. man who absconded from justice before being convicted on multiple counts of fraud in ...

Continue Reading →
0
Page 4 of 61 «...23456...»