Latest posts

Change layout
Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

Building the Backup Infrastructure in Small Organizations: Hybrid Systems

Part 3: SMB Backup Infrastructure: Hybrid Systems

Part 3: SMB Backup Infrastructure: Hybrid Systems

This is the third in a series of articles on setting up backups. The first was on backing up local infrastructure. The second was on setting up backups when a company’s applications and data are all in the cloud. This article addresses the third scenario: when a company has some data in the cloud and some local. This might be a scenario where the basic productivity apps like the office suite are hosted locally, and specialized apps like payroll or enterprise resource planning (ERP) apps are in the cloud. Continue reading

Part 2: SMB Backup Infrastructure with Cloud Apps

Part 2: SMB Backup Infrastructure with Cloud Apps

Part 2: SMB Backup Infrastructure with Cloud Apps

This article covers organizations that have no in-house IT infrastructure; they have PCs, or ChromeBoxes, or other terminals, but they’re only used to access apps via the browser. It might be MS Office 365, Google Apps, another cloud office suite, or other Cloud apps as well, such as sales force automation, customer relationship management, accounting software or enterprise resource planning. Continue reading

Windows Server Hardening

Windows Server Hardening Checklist

Windows Server Hardening Checklist

What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading