Is your disaster recovery plan up to par?

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of useful information.

WordPress websites under attack

WordPress websites under attack

It’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks.

Which social media platforms suit your SMB?

Which social media platforms suit your SMB?

The first thing that comes to mind when you think of social media is Facebook and for good reason. Not only does it boast the most users, but it also has the biggest reach and cultural impact. Since there is no one-size-fits-all social media platform, it’s imperative for small- and medium-sized businesses to examine their options before making an investment.

Vulnerabilities in popular printers

Vulnerabilities in popular printers

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs.

An early look at Android Instant Apps

An early look at Android Instant Apps

Back in May 2016, Google gave us a sneak preview of Android Instant Apps, a feature that loads a web-based version of an app instead of installing it. Today, the feature is available for limited testing on Google Pixel and certain Android devices. If you want to try out Instant Apps, follow the steps below.

3 Common mistakes in virtualized networks

3 Common mistakes in virtualized networks

Data storage may be one of the easiest facets of virtualization to explain, but that doesn’t make it immune to problems arising from confusion. There are a few things that can cause virtualized data storage to underperform, and most of them can be easily fixed by technicians who know their stuff.

VoIP call forwarding: Do you need handsets?

VoIP call forwarding: Do you need handsets?

The list of benefits that accompany a VoIP migration is long and conclusively proves that internet-based telephony is better than its analog predecessor. What is slightly less decisive however, is whether the liberating mobility of VoIP requires you to set up desktop phones at all.

Be the first to enjoy new Office apps

Be the first to enjoy new Office apps

Microsoft churns out new Office 365 features for users almost every month. Last year, there were several additions to Word, Excel, and PowerPoint that further enhanced user experience. This year, Microsoft will likely introduce new features that can benefit businesses.

How can you go from reactive to preventive IT?

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content.

Add-in support for Mac’s Microsoft Office

Add-in support for Mac’s Microsoft Office

Support is defined as providing assistance, encouragement, or comfort to help someone achieve a certain goal. For Mac’s version of Microsoft Office, support comes in the form of add-ins that aim to enhance user experience. Although usability testing is currently underway, you can still read about the latest developments here:

Office add-ins are applications running within the suite’s constituent programs that provide features not available by default.