Blog

Advice from a failed disaster recovery audit

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

Vulnerabilities on WordPress websites

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website.

Are your printers safe?

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise.

How to get a sneak preview of Instant Apps

How to get a sneak preview of Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a cloud version of an app without having to download it from the Google Play Store. While the technology isn’t yet available to the general public, Google is running a limited test of the technology for a few devices.

Why you should be an Office Insider

Why you should be an Office Insider

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways they do this is with the Office Insider program, a voluntary Office 365 subscription that gives participants a sneak peek into future Microsoft developments.

What exactly is preventive cyber-security?

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

G Suite vs. Office 365

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business?

Cost and commitment
G Suite offers two pricing plans: $5 and $10 per user per month.

Browser showdown: which one is right for you?

Browser showdown: which one is right for you?

Back when Internet Explorer was competing against Netscape, users had far fewer things to consider. Nowadays, some users do nearly all their work inside of a web browser, and they have far more options about which program to use. If you’ve ever questioned whether there might be a better way to browse the web, we’ve got your answers right here.