Blog

4 questions to ask your cloud backup service provider

4 questions to ask your cloud backup service provider

When it comes to choosing a cloud backup provider, many businesses often jump the gun and make hasty decisions based on limited information or pressure to start as soon as possible.
However, it's important that you understand the financial and operational impact that this choice will have on your business before rushing into a long-term commitment.

How Amazon AppStream 2.0 can help businesses

How Amazon AppStream 2.0 can help businesses

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.

How to protect your VoIP system from phishing

How to protect your VoIP system from phishing

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.

How to protect your organization from social engineering

How to protect your organization from social engineering

Have you ever received the notorious email from the Nigerian prince who promises you one million dollars in exchange for your social security number, date of birth, address, and credit card details? While this seems like a poorly disguised scam, you'd be surprised by how many people are actually fooled by this social engineering trick.

Black and white: Not all hackers are bad

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.