Hardware Refresh

Customize Your Hardware Refresh Cycle

3/22/19
Share: Facebook Twitter Google Email

The idea of the refresh cycle – a planned, knowable, consistent schedule of hardware updates – is one of the foundations of IT budgeting. The challenge has always been around timing. Refresh too early and you're throwing money down the drain. Upgrade too late and you risk impacting the...

Windows 10

The Real-World Benefits of Upgrading to Windows 10

3/19/19
Share: Facebook Twitter Google Email

Still wondering if you should upgrade to Windows 10? I get it, I usually like to wait and see how these things pan out first. But this upgrade seems pretty legit. Microsoft’s latest operating system is a solid product, with improvements under the hood that have made it more secure with an...

Facebook

2FA-Another Facebook Headache

3/05/19
Share: Facebook Twitter Google Email

Doubling up on your social media security? Unfortunately, it may be working against you. On Facebook, two-factor authentication using your phone numbers as verification isn't so secure. Facebook is simply tanking in the trust department. Two-Factor Authentication a Trap? Sadly, the...

Online

5 Ways to Stay Safe Online

2/26/19
Share: Facebook Twitter Google Email

With spoofing, smishing, scams, malware and more, the Internet can feel like the Wild Wild West these days. Add in a riot of new IOT devices, from Alexa to iWatches and Internet-connected appliances, and the door to vulnerability has opened us up to even greater risks. On the bright side, with...

Manufacturing

How Secure is Your Manufacturing Operation?

2/18/19
Share: Facebook Twitter Google Email

After the public and finance sectors, the manufacturing industry is the third most targeted by cyber-attacks, as the threat from malicious hackers, cybercriminals and corporate espionage escalate. The fact that industrial processes are increasingly connected - via the Internet of Things (IoT) -...

security

Why You Need a Multi-layered Cyber Security Approach

2/11/19
Share: Facebook Twitter Google Email

With a new year ahead, it’s wise to look ahead at some of the new cyber-security laws impacting your business.   One of the more pressing concerns for California business (and it’s a whopper) is the California Consumer Privacy Act of 2018, which will take effect in...

Phishing

Have Your Users Made You an Easy Target for Spear Phishing?

2/01/19
Share: Facebook Twitter Google Email

Have unwanted emails made their way into your inbox this month? Targeted spear phishing and blackmailing spam attacks are on the rise. Unfortunately, even with a strong anti virus and a well designed firewall, some spam will still make it through. These are simple text emails that slip through the...

Intelligent Manufacturing

New Trends in Intelligent Manufacturing

1/23/19
Share: Facebook Twitter Google Email

When you read the word “manufacturing”, surely one of the first thoughts that pops into your head is Henry Ford’s 1913 introduction of the moving assembly line. It took the concept of mass production, introduced standardization, and saw the time required to build a Model T go from 12...

Virtualization

Virtualization: Save Time and Money

1/22/19
Share: Facebook Twitter Google Email

In principle, virtualization is very simple. It divorces software from hardware, allowing you to combine the software that would normally run on separate physical servers onto a single piece of hardware. These ‘virtual servers’ make possible tremendous efficiency gains: no longer will you have...

Cybersecurity trends for 2019

Cybersecurity Trends for 2019

1/17/19
Share: Facebook Twitter Google Email

Cybercrime is exploding. If 2019 is anything like 2018, we all need to get ready for a wild ride. Here is the newest research on the magnitude of cybercrime. 1. The total cost of Cybercrime is predicted to top $6 trillion annually by 2021. This amount is more than the global drug trade....