Blog

How to avoid your own Delta IT disaster

Earlier this year, thousands of Delta passengers worldwide were grounded due to a power outage that halted critical IT operations. This was a huge problem not only for the many delayed travelers, but also for the airline company itself. Within three days, the airline company cancelled around 2300 flights and paid over millions of dollars in downtime costs.

Apple announces iOS 10 release date

Apple loves dramatic product reveals, and unfortunately that often means long wait times for new devices and software. Consumers have had plenty of opportunities to read about how great iOS 10 is, albeit with no official release date to accompany it.

Android Nougat’s top 9 features

What gets you out of bed each day? Is it the smell of freshly-brewed coffee or the sounds of bacon sizzling on the pan? Now apply this toward smartphones: What gets you really worked up? Could it be the new, sleek design or its upgraded selfie camera? Regardless of the reason, we are all drawn to novelty like moths to a flame.

New security patches for VMware machines

While virtualization still has a host of security advantages over its localized counterparts, it isn’t exempt from the attention of cyber attackers. Most recently, one of the industry’s leading software vendors, VMware, was forced to release a patch for a critical vulnerability that allowed underprivileged users to attain access to administrative rights.

Google’s cloud services are no longer beta

In an age where we sometimes move faster than the speed of light, patience is a quality not many possess. Like children who keep asking “Are we there yet?” or “When can I have another cookie?”, those who don’t learn to wait are denied the harvest of sweeter fruits.

New heights in data compliance penalties

The tech industry is littered with buzzwords: overused jargon generally meant to inspire feelings of hope and accomplishment. Not all have positive connotations however, and data compliance is one of those spooky buzzwords that many small- and medium-sized businesses have scant specific knowledge about.

Keep your Dropbox secure

The next time you visit Dropbox.com, you may be asked to create a new password. Why? Back in 2012 the cloud storage firm was hacked, and while it thought only email addresses had been stolen, new evidence has come to light that user passwords were compromised, too.

Business projectors: a buyer’s guide

If your last business presentation was dim, faded, or encumbered by bulky equipment, it’s probably time for a new office projector. And like any hardware purchase, that means a host of new specifications and measurements need to be learned to avoid sinking money into a useless lemon.

Email is the primary avenue of attack for most cybercriminals, who use it to target individuals and businesses with phishing scams, ransomware attacks, and other cyberthreats. Learn how email security maintains the integrity of your emails, accounts, and data.GET A FREE COPY NOW!
+