Are you going to make sure your machete is handy and start boarding up your windows for the coming of George Romero's slow-moving walking dead, or will you load up on ammo and lock yourself in a bunker for the more active and feral Max Brooks-type zombies? What about your data, like your Zombie Survival Guide E-book? Is it safe?Last modified on Continue reading
When you go home for the night and lock your office door, what happens in your office under the cover of darkness? During the day, you are present to monitor what goes on and control the chaos, but what kind of monitoring and controls are in place for your office at night?Last modified on Continue reading
As every good Stars Wars fan is well aware, May 4th is Star Wars Day (May the fourth be with you). As an IT company, we love all technology, especially tech from a long time ago in a galaxy far far away. Therefore, let us take a moment and look at the most famous technology from Star Wars, Darth Vader.Last modified on Continue reading
Last modified on
With all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.
This week, Microsoft will be releasing critical security patches for Windows, Office, Internet Explorer, and SharePoint Server. Updating software is something Microsoft does routinely; however, users should pay attention when critical patches are released because they are,well, critical.Last modified on Continue reading