Cyberattacks Are Getting Worse – But How Can You Defend Against Them?

Cyber Attacks Are Getting WorseOn December 23, a large section of Ukraine went dark. The source wasn’t mechanical failure, nor was it human error. According to Ukrainian officials, it was a cyber-attack, the source of which was reportedly Russia.

To make matters worse, a more recent attack against Kiev’s main airport probably originated from the same source. Read more »

Why The Consumer Electronics Show Should Matter To CTOs

Why CES Should Matter To CTOsIt’s been a few weeks since this year’s consumer electronics show wrapped up. Businesses from all over the tech industry showed up to strut their stuff. Although most of what was showcased was (not surprisingly) consumer tech, it nevertheless spanned industries as diverse as healthcare, automotives, and virtual reality. Read more »

The Worst Data Breaches Of 2015

Worst Data Breaches Of 2015It can get kind of exhausting, trying to keep up with all the data breaches surfacing in the media. It seems like almost every other week, there’s some new crisis in circulation; a new leak, hack, or exploit that puts our personal information at risk. Some are worse than others – a hospital losing a few thousand patient names versus a bank losing hundreds of thousands of financial records, but every breach of private data has the potential to wreak considerable emotional and financial harm on the people concerned.

Today, we’re going to take a look back at some of the worst data breaches we saw this year. Hopefully, as we move forward into 2016, we don’t start seeing incidents that top them (though we probably will). Read more »

The Five Most Common Rookie Mistakes In CentOS, And How To Avoid Them

Common Mistakes In CentOSNobody’s perfect. And in the world of network and server administration, mistakes tend to be all-too-common – especially when you’re into your third night of troubleshooting hopped up on enough caffeine to put a Starbucks franchise out of business. Of course, there are some mistakes not even a sleep-deprived, overworked sysadmin will make; novice errors that no one in their right mind would fall victim to.

You haven’t bumbled into any of these, right? Read more »

Ten Of The Best Cheat Sheets For First Time Linux Admins

Ten Best Linux Cheat SheetsWe live in a world where most operating systems can be navigated with a few clicks, taps, or swipes. To many, Linux seems almost to hail from another century, perhaps even another civilization. Small wonder that even some Linux administrators have trouble keeping all the commands and language they have to use in their day-to-day. Read more »

What Does The 2015 State Of The Sysadmin Survey Say About Your Career?

2015 State Of Sysadmin SurveyIf you’re a sysadmin, there’s a good chance you fall into one of two camps. Either you feel appreciated and well-liked within your organization, or you believe most people within your business simply see you as a walking band-aid for their technical problems. Unfortunately, as it turns out, there really isn’t a whole lot of middle ground there. Read more »

Everything You Need To Know About The Cryptowall Ransomware

Cryptowall RansomwareAccording to Trend Micro, 2016 will be “the year of online extortion.” Ransomware and extortion tactics targeting users both within enterprise and without will see a sharp increase. Online threats, the report explains, will “evolve to rely more on mastering the psychology behind each scheme than mastering the technical aspects of the operation.” Read more »

Five Services No Cloud Implementation Should Be Without

Services No Cloud Should Go WithoutSo, you want to start using cloud computing in your organization? That’s awesome! Just…keep one thing in mind first, alright? Particularly if you’re building your own cloud, there are certain components and services you need to make sure your business has access to.

Because if it doesn’t, then you simply aren’t up to the challenge of maximizing the benefit the cloud could bring to your business.

The good news is that if you know what you’re doing, it’s not difficult at all to prepare for – and implement – virtually any cloud service model. And that’s where we come in. Today, we’re going to talk about what your business needs to provide in order to be cloud-ready.

Shall we begin? Read more »

Will Bimodal IT Be Your Business’ Route To The Cloud?

Bimodal IT Route To CloudWhen I talk to businesses about their plans for cloud deployment, a frequent response is that they’d love to reap the benefits of the cloud, but that their company’s IT department isn’t organized in a way that makes it possible.

Traditionally, IT departments have been all about stability and availability — it’s their job to keep things running smoothly come what may. Risk aversion is deeply ingrained. While it’s certainly possible to maintain these IT virtues in the cloud, to leverage the cloud to its fullest advantage requires a more flexible, agile approach that may not mesh well with traditional IT. Read more »

Brute Force Attacks On WordPress Are At An All-Time High: How To Protect Yourself

Brute Force Attacks On WordPressAccording to security firm Sucuri, brute force attacks targeting WordPress have recently seen a sharp increase – and they show no signs of slowing. In the second week of September, they ballooned to 35 million attacks per day – up from 5 million at the beginning of the year. Read more »

get in touch Get in touch with us

Questions? Concerns? Comments? We want to hear from you! Drop us a line with whatever is on your mind and we will get back to you ASAP!!



Signup to be the first to know about new products and services!