Blogs, Articles and Tips

What We Can Learn From the New Orleans Ransomware Attack

January 20, 2020

Ransomware attacks against municipal governments continued in force last month, as four U.S. cities found themselves at the mercy of hackers: New Orleans, Louisiana; Pensacola, Florida; Galt, California; and St. Lucie, Florida. It’s unclear at this point if the four attacks are connected. All we know for sure is that they won’t be the last and that it’s imperative we learn as much from them as possible.


How to Protect Edge Computing Against Cyberattacks

December 30, 2019

As the Internet of Things becomes more widespread, the amount of data it produces increases exponentially. As that happens, it becomes both cumbersome and inefficient to rely on centralized servers and platforms. Instead, computing increasingly must be done at the edge. However, this comes with its own set of cybersecurity concerns and challenges.


Three Things To Consider When Purchasing Colocation Space

December 25, 2019

If you’re planning to purchase colocation space for your business, there’s a lot of stuff to consider first. You need to look into not only the facility and the resources it offers, but also the organization maintaining it.  We’ll go over the most important questions to ask - and the most important factors to examine - to help you make the most informed decision possible.


Canon Medical's Gateway Platinum Is A Good First Step For Healthcare Cybersecurity

November 13, 2019

Canon Medical Systems - one of the leading manufacturers of diagnostic medical hardware in the United States - has unveiled a new cybersecurity solution intended to help healthcare providers tackle the ongoing challenge of protecting patient data. It’s a step in the right direction - and one which medical organizations looking to improve their security posture should take note of. 


China's New Cybersecurity Rules Are Bad News For Everyone

November 05, 2019

As you may have already heard, China intends to implement a new set of cybersecurity rules which forbid foreign companies from encrypting data and allow Chinese officials to share whatever information they choose with state organizations. This is a very bad thing for both businesses and consumers.


3 Workplace Collaboration Alternatives to Microsoft Teams

October 31, 2019

Microsoft Teams is a pretty powerful collaboration tool - but it’s not everyone’s cup of tea. Maybe you had a bad experience with Windows 10. Maybe you’ve found yourself frustrated by one of the many glitches common with the platform. Maybe it doesn’t work so well in your IT environment. Whatever your reasons, there are plenty of alternatives - here are a few of the best.


What the White House Cybersecurity Chief's Departure Can Teach About Securing an Organization

October 29, 2019

Late last month, White House security Chief Dimitrios Vistakis resigned, citing “absurd” internal practices. While it’s no secret that the current administration has had a spotty relationship with cybersecurity, Vistakis’ resignation should be a wake-up call for the U.S. government. The good news is that even if it isn’t, it can be a wakeup call for you.


3 Ways a System Administrator Can Deal With Bad Users

October 24, 2019

Every administrator has at least one horror story from their time in the field. We’re the people who are responsible for keeping things running smoothly. That means that when something goes wrong, we’re the first on the chopping block. Here’s advice for managing that anger - along with some of the other baffling and aggravating tendencies of the end-user.