Archive: 2017 May

Should I use a service provider? Or, should I use a Data Center?

If you’re reading this, you have already identified the need for data center “space.” The question that should continue to be asked is “Can I justify this?” at every step along the way. You can choose to select a local data center, and sign a contract for a ½ CAB, Full CAB, or several CABs of space. The data center will provide you with empty cabinet space, power, and connectivity. Most data centers can rack, and connect your equipment (for a fee). You are responsible for everything else. Before any device is racked, these questions should have already been addressed: What power do I need? 120V, or 208V? Do I need A/B Redundant Power, or a UPS (Uninterrupted Power Supply) What […]

Continue reading

Wannacry Ransomware

In this day and age where we’ve never been more attached to our gadgets and computers, imagine if your laptop was literally held ransom? That’s the reality thousands of individuals and corporations woke up to on the May 12th, 2017 when a global malware campaign, called WannaCry (also called WCry or Wannacryptor), began.   This malware is a ransomware variant, and some of its most notable victims are the United Kingdom’s National Health Service (NHS), Telefonica in Spain, Renault in France and some Chinese universities. This article aims to reveal key details about this rapidly growing malware threat and how to protect your computers from it.   How does WannaCry Operate? Most malware attacks are focused on security vulnerabilities on […]

Continue reading

Three Critical Steps To Protecting Your Business From Mobile Malware

  Mobile malware is on the rise. According to a recent Kaspersky survey, malicious software targeted at mobile devices increased by nearly 1.7 times between Q1 and Q2 2016. It’s an upward trend that shows no signs of slowing – and if you haven’t adjusted to it yet, it’s long past time that you do. Smartphones have, after all, become ubiquitous in enterprise. Everybody uses them, even if you think they don’t. If you get complacent and fail to secure them, you will eventually suffer a breach. It’s not a question of if – it’s a question of when. MDM, MAM, and MCM Standing for Mobile Device Management, Mobile Application Management, and Mobile Content Management respectively, these three abbreviations are […]

Continue reading

Tell Us Your Problems. We Have Solutions.