Lessons from the 2019 Baltimore Ransomware Attack

Lessons from the 2019 Baltimore Ransomware Attack

On May 7, various networks operated by the City of Baltimore were subject to a ransomware attack that resulted in a loss of more than $18 million. Municipal services in this large American metropolis were substantially crippled by the attack over several weeks; the City Council ordered employees to set up temporary Gmail accounts, but…

Details

Understanding the New Windows 10 Pro and Enterprise Upgrade Requirements

Understanding the New Windows 10 Pro and Enterprise Upgrade Requirements

Technology giant Microsoft recently made a very important announcement about the future of the Windows 10 operating system, particularly as it relates to future upgrades. In essence, the next major Windows 10 1903 upgrade, which is currently rolling out for most devices, will require twice as much storage space available. If the desktops, laptops, and…

Details

Understanding Hybrid and Private Cloud Systems

Understanding Hybrid and Private Cloud Systems

Cloud computing, at least as we came to know it during its inception in the late 1990s, has changed significantly. When most people think about “the cloud,” they have a vision of public cloud computing, which encompasses popular services such as Microsoft Office 365, Google’s G Suite for business productivity, and Software-as-a-Service solutions such as…

Details

What You Should Know About Endpoint Security

What You Should Know About Endpoint Security

Network specialists and hackers have different views of endpoints. In essence, endpoints are devices that connect to networks; network specialists see them as gateways while hackers see them as potential targets. When it comes to information security, experts see endpoints as both targets and gateways, and this is the view you should adopt as a…

Details

Information Security Lessons From the Marriott Data Breach

Information Security Lessons From the Marriott Data Breach

In December 2018, news about a massive data breach of networks used by Marriott International prompted United States Secretary of Commerce Wilbur Ross to comment on the matter. In response to a question presented by financial news network CNBC about the Marriott incident, which compromised the personal information of up to 500 million hotel guests…

Details

Making Data Backup and Disaster Recovery Planning a Priority in 2019

Making Data Backup and Disaster Recovery Planning a Priority in 2019

According to statistics compiled by the United States Federal Emergency Management Agency, 90 percent of small business owners whose companies go through a disaster are forced to shut down operations unless they are able to get back up an running in less than a week after the catastrophe. Disaster recovery planning is a crucial business…

Details

E-commerce Business Owners Should be Vigilant During the Holidays

E-commerce Business Owners Should be Vigilant During the Holidays

Even though Black Friday and Cyber Monday are generally known as the busiest shopping days of the year, a heavy online retail activity is expected to continue throughout Decembers, and this translates into a greater potential for cybercrime. Data breaches and network intrusion attacks are often launched against e-commerce websites during the holidays, and this…

Details

Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details

How Managed IT Services Help Your Business Succeed

How Managed IT Services Help Your Business Succeed

Very few companies these days are able to operate without a technology platform. In California, even micro companies such as food truck operators and small enterprises such as family need some level of IT infrastructure or functionality. Once a business begins to rely on technology for day-to-day operational purposes, even the slightest IT setback can…

Details

Is a Self-Hosted Cloud Solution Right for Your Business

Is a Self-Hosted Cloud Solution Right for Your Business?

Many people think of cloud computing strictly as a solution that involves entrusting third parties to manage their business data, but this is only one aspect of the cloud. When you pay for an Office 365 subscription, for example, you are using a public cloud solution and trusting Microsoft with your data. The Benefits of…

Details