Blog

Is serverless computing as good as it sounds?

The next big thing in cloud computing is capturing small-business owners’ attention, and it’s easy to see why. Even after migrating to the cloud, businesses are still forced to deal with configuring and maintaining servers; it’s just done over the internet. Serverless computing changes that entirely. What is it? Outsourcing workloads to the cloud — […]

Hackers KRACK WiFi security

For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger. What is KRACK? Simply put, KRACK, short for ‘key reinstallation […]

Apple Pay Apple Pay: Safe and secure transactions

It was only a matter of time before our smartphones replaced our wallets. There are several mobile payment systems available today, but Apple Pay is one of the safest and easiest to use for small businesses. Read on for more details on why you should consider it. How does it work? Credit card transactions are […]

Cisco to predict IT failures using AI

Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years. Artificial intelligence (AI) and machine learning are extremely useful in helping […]

The right way to set up guest Wi-Fi

Customers, partners, and vendors expect internet access when they’re visiting someone else’s office. This is why guest Wi-Fi access is so common. But setting it up the wrong way can create a frustrating experience for people looking to connect and leave your company exposed to attacks. Here’s how to do it right. Never give guests […]

Android users welcome Microsoft Edge

Have you ever been glued to a long, interesting article on your mobile device? You then arrive home, turn on your PC or laptop, and want to continue reading the article. What’s the quickest way to transition? Microsoft’s Edge browser has a pretty cool solution. Why Microsoft is expanding Edge to mobile Microsoft’s Windows Phone […]

Protect your devices with virtualization

With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions. Mobile device management and virtualization Simply put, […]

Your passwords are not secure

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines […]

New vulnerability discovered in High Sierra

The macOS operating system has a reputation for being impervious to security risks, but according to recent news, that’s not always the case. In High Sierra, even someone with zero IT experience can steal your password. Here’s how to stop them. What is the bug? The vulnerability pertains to sweeping changes in how macOS stores […]