The Tek > Blogs
X

Blogs

Sign up for our Newsletter
Name

Managed service providers (MSPs) find themselves in a difficult position as their clients needs shift to meet the demands of an always-on, commerce and data-driven digital infrastructure. The original MSP mission was to meet uptime demands of service level agreements. If an MSP kept the client up and running, took care of hardware issues, and made sure things operated smoothly, his job was complete. Today, MSPs are getting stretched thin with new demands that require new tools, new knowledge, ne...
Read More
A new law enacted by the European Union known as the General Data Protection Regulation or (GDPR), is set to go into effect on May 2018. The law is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).
Read More
Every single parent on this planet seems to have that one story. The one where, when they tell it, it’s always a bit humorous, embarrassing, and begs the question of, “are they proud of their child for what they accomplished, or do they know it is so embarrassing, for the child, they just have to tell it?” In my case that story essentially boils down to how much I have loved Star Wars from an early age.
Read More
For "Small & Medium-sized Business (SMBs)". - "A fairly inexperienced hacker can attack a large number of SMBs with little risk, higher payment return, less law enforcement interference, and almost no chance of retaliation. Why? Because SMBs are not prepared and in many cases apathetic. It will never happen to me—that’s something that happens to the other guy."
Read More
By By Rick Miller - In the history of our democracy, we have never had a more open, free, and unregulated system of information and communication than the internet. The industrial revolution pales in comparison to the global impact of technology on an unexpecting world. Like all world-changing advances, the internet and all its associated technology has created astonishing benefits and unmatched threats.
Read More
The most interesting statistic to come out of the cyber security market in the last couple of years is also one of the most overlooked. This statistic points to one of the most obvious problems facing cyber security experts today. It is also one of the most affordable and easiest problems to fix. So what is this statistic? It involves your people and an activity they do at work every day. Read more lo learn: 10 ways to avoid phishing scams
Read More
As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats. 
Read More
The cybersecurity landscape changes every day, with new actors, new threats, new schemes, and new ways to infiltrate websites, emails, devices, and almost anything that is connected to the internet. We’re constantly reading about the rise of spear phishing, DDoS attacks, global malware threats, ransomware, CEO fraud, and more.
Read More
You just clicked on a link that contained malware. Your computer screen turns red. You are the victim of a Ransomware attack. All of your data has been locked down. You can’t access any of your systems. Your company is completely shut down. You need to restore your data and get your company back up and running. Every minute means lost revenue and production. Fortunately, you have a back-up plan. Your back-ups are valid, you restore your data and you are back on-line.
Read More
Did you know that 140,000 disk drives crash per week in the U.S.?  That’s a lot of lost data! Are you prepared for a data loss incident? Are malware and ransomware a concern to you? Do you have a backup strategy in place? Is your backup strategy reliable enough to get you back up and running in a critical situation? ......
Read More
Page 1 of 4 FirstPrevious [1]234 Last