Data Protection: If All You Have Is a Hammer, Everything Looks Like a Nail


If all you have is a hammer, everything looks like a nail!" This proverb was first introduced to the English lexicon by Abraham Maslow, an American psychologist who is best known for creating Maslow's hierarchy of needs psychology theory.  The meaning of the saying is that with limited tools,...

Read More
Cyber attacks

Cyber Attacks Now More Costly than Natural Disasters


We all know earthquakes and hurricanes are a threat. But when did a cyber attack become as catastrophically damaging to our economy? Welcome to 2017 and the year US businesses will spend more money protecting themselves from virtual upheavals than physical threats. Lucinda Shen at Fortune writes:...

Read More
Public Cloud

How to Evaluate Private vs Public Cloud Solutions


Using the cloud properly demands understanding exactly what it is. These days, it's no longer about one approach; modern cloud technology is an architecture that is expressed in a variety of ways. Is cloud computing overhyped? Yes, according to a recent research note by Gartner. Effective and...

Read More

3 Ways Cloud Communications Can Save Your Company Money


What is a Cloud Communication System? These days, companies are demanding more from their technology. At the same time, IT budgets are decreasing, widening the gap between what employees want—and need to be more productive—and what IT can offer. The trick is to find technologies that make the...

Read More

Deciphering Ransomware: Is it Petya or NotPetya?


Confused by all the new varieties of ransomware?--Is it Petya or NotPetya? As new ransomware stories pop up in the news every week, it's challenging to keep track of and understand all of the different strains. But with a little deciphering, uncovering the specific type is easier than you might...

Read More

Steps You Can Take To Protect Your Network


The last few weeks have initiated a dizzying array of malware and ransomware attacks on global networks. First "Wanna Cry," then "Petya" followed closely by "Not Petya." These attacks are different then typical hacks of the past because these infections rely heavily on social engineering--meaning...

Read More