Blog

Are SDN & network virtualization the same?

Nobody’s perfect, even IT technicians. We’ve seen plenty of people interpret software-defined networking and network virtualization as the same exact service, but it’s time we clear up the difference. It’s small, but it could be the difference between major cost savings and a small increase in functionality. Software-defined networking (SDN) Managing storage, infrastructures, and networks […]

WebRTC vs VoIP: competing or complementary?

Although some critics are labeling the newest tool in the internet-based telecommunications field a “VoIP killer,” nothing could be further from the truth. The reality of the situation is that this new technology, WebRTC, is here to make it even easier for customers to contact your business using the internet. Let’s find out if it’s […]

Selecting the perfect Office 365 plan

Office 365 Business, Business Premium, Enterprise E1, E3, and E5. Each of these Office 365 plans offer different features and services. Implement the wrong one, and you may end up with a solution that doesn’t fully meet your company’s needs. To help your business select the right Office 365 license, we’ve summarized and listed the […]

Helpful Cortana commands for everyone

Cortana, Microsoft’s voice-activated personal assistant, is extremely helpful for day-to-day tasks. Whether you need her to reschedule a meeting or draft an email, she’s always happy to help. If you’re dealing with several time-consuming tasks, use these Cortana commands to make your life a lot easier. Hey, Cortana Before asking her to do anything, we […]

More healthcare firms migrate to the cloud

Healthcare providers have a lot on their plate: Caring for patients is first and meeting compliance regulations comes at a close second. Hospitals and smaller practices truly benefit from technology experts coming on-site, installing all the right IT systems, and leaving clearly outlined instructions, amounting to a swift and inexpensive process. Of course, they still […]

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it. According to […]

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of […]

WordPress websites under attack

It’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks. Recently, some 20 attackers defaced thousands of WordPress websites. If you think 20 attackers is frightening, […]

Vulnerabilities in popular printers

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs. Today, we unveil the mechanics of this […]