You’ve probably heard about the recent massive network security breach that affected many governmental organizations (e.g. Unclassified Pentagon Network, Department of Homeland Security, State Department, Department of Energy, National Nuclear Security Administration,...
If you can remember back to the days of computers before the internet, you probably only had 1 or 2 passwords. Maybe one to get into your work computer, and – if you were being hyper secure – maybe one on your accounting program. That was it. Even in the days after...
Most businesses invest considerable effort and resources in keeping their networks secure. Many home users also do their due diligence by installing home routers/firewalls. Yet many of these, often without thinking about it, and sometimes without even knowing about...
If you are like most small businesses, when you buy a new piece of IT equipment, you might do some configuration on it, and then put it in use, and you’re done. You let it do its thing until it breaks. If you’re a very small shop, that might be good enough, as the...
Cloud computing has caused a massive shift in how many companies do business; in some ways the shift is comparable to the introduction of the Internet itself. A big part of cloud computing is moving servers, raw data, application data, or business processes to the...