Manage the security risks of virtualization

2016Mar31_Virtualization_BVirtualization security is a topic that often goes undiscussed on the Internet, and you may even think it’s a non-issue because of this. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and how you can go about mitigating them.

Is your computer infected with malware?

2016Mar29_Security_BHas your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system.

Outdated DR myths worth ousting

2016Mar21_BusinessContinuity_BWe are no longer in the dark ages of Disaster Recovery. With the onset of cloud computing, DR has become more efficient and affordable than ever. Despite this fact, many business owners still cling to their medieval DR mindsets and myths that belong in debates among king Arthur and his knights of the round table.

Should you virtualize your business?

2016Mar18_Virtualization_BUpgrading your hardware is an incredibly long, arduous and costly process. Fortunately, virtualization has become a popular, affordable and flexible solution to upgrade your network. However, before you start investing in virtualized systems, it’s important to consider the benefits and costs that come with this solution.

How to revive your old laptop

2016Mar17_Hardware_BSpring is a time of new life. The buds on trees begin to blossom, baby duckling sightings become common, and that old laptop you stuffed in the back of your closet can be reborn…did we confuse you on that last one? Well, while Spring is usually thought of as a time for new life in nature, this year it can also be applied to technology – your laptop to be specific.

Should you monitor your employees online?

2016Mar15_Security_BTo monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it a success if you go through with it.

10 Tools to help you get ahead in social media

2016Mar14_SocialMedia_BSocial media marketing can be time consuming. You may spend hours upon hours trying to get it right and still see little growth in your followers. So what can you do to be more effective and save time in the process? Here are ten tools that can streamline your social media efforts and even offer guidance.

Why BI is for everyone

2016JMar10_BusinessIntelligence_BIf you’ve managed to convince yourself that only large enterprises have the money to take advantage of Business Intelligence (BI), it’s time to think again. While it’s true that in the past you needed the help of pricey specialists to really delve into BI, these days a range of self-service tools mean that small- and medium-sized businesses can do much more by themselves.

Geek speak decoded

2015Mar2_Hardware_BGeek speak, tech talk, jargon or whatever you want to call it, computer terminology can be confusing. However, having a basic understanding of some of the words may be beneficial to the non-IT professional. Speaking a basic level of this language can help you clearly explain a computer problem you’re having, and even help you find the perfect technology for your next IT purchase.

IT security concerns of the finance sector

2015Feb29_Security_BThe time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas.