Guidance – SMB IT Security has 4 layers

SMB IT Security has 4 layers by Today’s IT environment is littered with constant attacks to compromise the security of your data. In SMB networks a structured, layered approach to IT security is often overlooked as business owners have more pressing issues to consider. Many business owners consider basic or even free Anti-Virus products sufficient [...]

By | 2017-05-22T16:23:53+00:00 May 22nd, 2017|Uncategorized|0 Comments

UC Berkeley: Top 10 Secure Computing Tips

Top 10 Secure Computing Tips Tip #1 - You are a target to hackers Don't ever say "It won't happen to me".  We are all at risk and the stakes are high - to your personal and financial well-being, and to the University's standing and reputation. Keeping campus computing resources secure is everyone's responsibility. [...]

By | 2017-05-16T14:31:50+00:00 May 16th, 2017|Uncategorized|0 Comments

Virtual Desktops and Ransomware

Is VDI susceptible to ransomware threats? by Brien Posey @BrienPosey Check out Brien’s new book “Conversational Rocket Science”, available for free download at “Virtual Desktop Infrastructure”, for example Microsoft Remote Desktop, Citrix   VDI environments are in danger of ransomware attacks. They can encrypt personal and professional data that cannot be decoded [...]

By | 2017-05-15T21:46:37+00:00 May 15th, 2017|Uncategorized|0 Comments

Calculating the Cost of Downtime

Calculating the Cost of Downtime © 2017 Continuum Managed Services is a resource for managed services providers such as Thin-nology. October 11, 2016 • by Mary McCoy Several factors contribute to the total cost of downtime: Cost of Downtime (per hour) = Lost Revenue + Lost Productivity + Cost to recover + Cost of [...]

By | 2017-05-12T13:30:42+00:00 May 11th, 2017|Knowledge Center|0 Comments