Blog

Working at home presents completely new experience for many workers

Despite years of companies experimenting with telecommuting, nearly 49% of workers say they are working at home now and it is an entirely new experience, according to a study by Morphisec. Here's one of the study's findings that should send shudders through tech departments; 56% are using their own personal computers and 23% don't know what security they have in place for their devices.

What Happens When Critical Cell Networks Fail?

On June 22, with most of the nation quarantined and watching anxiously as demonstrations troubled the cities, a cellular circuit in the Southwest failed. What does this mean for you and your business?

A service outage to remember. That one failed circuit took down a fiber provider, which overloaded T-Mobile's network, and took down voice as well as data for all its customers for 13 hours.

Address Storage Issues Before Your Systems Decide To Protest Against Your Workday

One of the most aggravating error messages to see on your computer screen when you are hard at work and cannot save anything you’ve just completed is “Insufficient storage available...” One common cause for this is a shortage of space.

Do you know how much storage you have?

If you use a computer, tablet, or smartphone you can probably tell when your storage is filling up too fast.

Ignore these outdated disaster recovery myths

Disaster recovery (DR) used to be an expensive solution that relied predominantly on tape backups. Today, cloud computing has dramatically changed the DR landscape, affording even small- and medium-sized businesses cheaper and more reliable DR solutions. Unfortunately, there are still a number of misconceptions about DR. Here are three myths that no longer apply. Myth […]

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its stance. Find out why and learn what their new recommendations are for creating strong passwords. The problem The issue isn’t that the NIST advised people […]

Obsolete firmware poses security risks

Are you still hanging on to your old work computers since they “still work fine”? While they may still help you get the job done, their outdated firmware can make you vulnerable to security risks that can lead to major problems. What is firmware? Firmware is a basic type of software that is embedded into […]

Why it pays to have a good-looking website

In a recent survey of 1,800 customers, 42% said they’re “very unlikely” to purchase from ugly websites. That’s not so surprising. After all, there are plenty of competitors’ websites that are more visually appealing and user-friendly that they can visit. If your business website fails to make a critical good first impression, it could lose […]

A closer look at fileless malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic, IT processes, and system administration tasks while leaving fewer footprints. Ultimately, your business could be at […]

Keep your mobile devices safe with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses. That’s why it’s even more important to keep track […]