Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading
This is the third in a series of articles on setting up backups. The first was on backing up local infrastructure. The second was on setting up backups when a company’s applications and data are all in the cloud. This article addresses the third scenario: when a company has some data in the cloud and some local. This might be a scenario where the basic productivity apps like the office suite are hosted locally, and specialized apps like payroll or enterprise resource planning (ERP) apps are in the cloud. Continue reading
This article is the second in a series, (The first is here). It covers organizations that have no in-house IT infrastructure; they have PCs, or ChromeBoxes, or other terminals, but they’re only used to access apps via the browser. It might be MS Office 365, Google Apps, another cloud office suite, or other Cloud apps as well, such as sales force automation, customer relationship management, accounting software or enterprise resource planning. Continue reading
This article is the first in a series. In this part, we will cover building the backup infrastructure for a small team of 15 people or less, that is running their computer systems primarily on in-house hardware – a server or NAS, and PCs for each user. Continue reading
With new data breaches being uncovered daily, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe. 2FA is a security by-word nowadays. So, why do you still using old log-on techniques?
What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading