Guidance – SMB IT Security has 4 layers

SMB IT Security has 4 layers by mgrit.com.au Today’s IT environment is littered with constant attacks to compromise the security of your data. In SMB networks a structured, layered approach to IT security is often overlooked as business owners have more pressing issues to consider. Many business owners consider basic or even free Anti-Virus products sufficient [...]

By | 2017-05-22T16:23:53+00:00 May 22nd, 2017|Uncategorized|0 Comments

UC Berkeley: Top 10 Secure Computing Tips

Top 10 Secure Computing Tips Tip #1 - You are a target to hackers Don't ever say "It won't happen to me".  We are all at risk and the stakes are high - to your personal and financial well-being, and to the University's standing and reputation. Keeping campus computing resources secure is everyone's responsibility. [...]

By | 2017-05-16T14:31:50+00:00 May 16th, 2017|Uncategorized|0 Comments

Virtual Desktops and Ransomware

Is VDI susceptible to ransomware threats? by Brien Posey @BrienPosey Check out Brien’s new book “Conversational Rocket Science”, available for free download at https://t.co/HZuU5b6n1h “Virtual Desktop Infrastructure”, for example Microsoft Remote Desktop, Citrix   VDI environments are in danger of ransomware attacks. They can encrypt personal and professional data that cannot be decoded [...]

By | 2017-05-15T21:46:37+00:00 May 15th, 2017|Uncategorized|0 Comments

Calculating the Cost of Downtime

Calculating the Cost of Downtime © 2017 Continuum Managed Services is a resource for managed services providers such as Thin-nology. October 11, 2016 • by Mary McCoy Several factors contribute to the total cost of downtime: Cost of Downtime (per hour) = Lost Revenue + Lost Productivity + Cost to recover + Cost of [...]

By | 2017-05-12T13:30:42+00:00 May 11th, 2017|Knowledge Center|0 Comments