IT & SECURITY
Understanding RAID and Backups: They are not the same thing
Though RAID and back-ups can be both useful in protecting businesses from data loss, they are not the same thing nor can they be used interchangeably. Rather, both RAID and backup technology can be used together to protect an organization’s data. What is RAID? RAID...
How multifactor authentication strengthens network security
With newsfeeds being filled with headlines about data breaches, hacked networks and encrypted data held at ransom, its little wonder businesses are seeking ways to better secure their networks — and rightly so…
4 network solutions organizations can use to defend against cyber attacks
We’ve all seen the commercials featuring Mayhem, a bruised and battered Dean Winters in a disheveled grey suit, impersonating everything from a texting and driving teenage girl to a fiberglass-chewing…
5 reasons businesses are replacing their VPNs with SDP
Remote working, once thought mostly a nice idea, and perhaps largely only practiced in the tech sector, is now quite common thanks to Covid 19. In fact, according to one Forbes article, over the course of the pandemic, 45 percent of both…
Fishing, Phishing and Network Security: It’s all connected
It’s been said if you give a man a fish, you feed him for a day, but if teach him to fish, you feed him for a lifetime.
In a kind of a corollary to that, Bob Black, the founder of RK Black, is said to have told our copier technicians that…
6 tips for gaining and retaining organizational data privacy
Keeping your organization’s data secure and private should be a top priority. Why? Because data breaches are becoming increasingly common, destructive, sophisticated and expensive. According to Inc. magazine…
6 tips for strong, easy passwords to keep your business secure
Anybody using computers or any networked devices these days would likely agree — passwords can be cumbersome. They’re annoying to generate, difficult to remember and often frustrating to populate. To make them worse, they are required seemingly…
Printers pose major remote working cybersecurity risk
These days associates are logging in and putting in their hours from the comfort of home, some due to the many touted benefits of working from home — less stress, lower costs, no commute, better coffee and so on — or more recently…
How to securely send confidential documents
Right now, documents of all kinds are zipping across the world, from one computer to another, from one outbox to another inbox — some documents sensitive and some, not so sensitive.
With so many people now working remotely, many are using…