Windows Server 2016 and virtualization

Windows Server 2016 and virtualization

Virtualization is a great way to save money and increase the efficiency of your existing IT hardware, but how exactly do you implement a virtualization solution? There are several vendors that provide software solutions, but there’s one almost everyone has already worked with: Microsoft.

4 Tips for better server management

4 Tips for better server management

With so much technology moving to the cloud, onsite servers aren’t getting as much attention as they used to. Optimizing this critical piece of business technology is no small task, but there are a few simple things you can do to ensure the success of your in-house servers.

Web browser cybersecurity, ranked

Web browser cybersecurity, ranked

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start.

WannaCry: A historic cyberattack

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

Windows 10 updates for Fall 2017

Windows 10 updates for Fall 2017

Windows 10’s Fall Creators Update is the next major update that Microsoft will roll out in September. Besides reusing the same “Creators Update” name and focusing on bringing the Windows experience to iOS and Android devices, here are some noteworthy features users can expect.

How to reduce data loss in Office 365

How to reduce data loss in Office 365

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. And while those of you with Microsoft Office 365 installed have some security and compliance tools, there are still some data protection best practices you need to consider.

Amazon phones to become a reality soon

Amazon phones to become a reality soon

Amazon is setting its sights on the VoIP market again and will use its Alexa technology to launch a new phone system. Based on a new patent, users of Amazon’s artificial intelligence (AI) devices might soon be able to enjoy a smart speaker and phone in one.

What is virtual “sandboxing”?

What is virtual “sandboxing”?

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it’s worth learning about.

Browsers leak sensitive info to hackers

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill.

The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.