End ransomware with virtual DR

Mar 13, 2019

Ransomware like CryptoLocker and WannaCry has become more sophisticated over the years. No wonder that more ransomware attacks are expected…

How to create a Facebook ad that sells

Mar 11, 2019

Your products and services won’t sell, no matter how exceptional they are, if no one knows they exist. That’s where…

Microsoft works on new Windows OS

Mar 7, 2019

Microsoft announces new developments every month, but this is the biggest one yet. Several reports have found that Microsoft is…

Top security threats to financial services

Mar 6, 2019

Hackers go for the gold. This means that banking information makes for the number one target. These cyberattacks lead to…

Disaster recovery audit fail: A few lessons

Feb 27, 2019

In talking about disaster recovery plans (DPR), it’s best to illustrate with real-world scenarios to help you understand things better.…

Virtualization containers 101

Feb 25, 2019

The affordability of cloud computing and virtualization are helping small businesses do away with in-house IT hardware. Virtual containers are…

Understanding Office collaboration tools

Feb 21, 2019

Office 365 is so chock-full of apps, it’s sometimes difficult to keep track of them all. Sure, you have the…

How to disable nosy Windows 10 settings

Feb 20, 2019

Windows 10's Cortana tries to be helpful by displaying accurate, personalized ads based on your online searches and spamming useful…

A closer look at fileless malware

Feb 19, 2019

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal…