Microsoft Azure is a cloud computing platform, among many functionalities Azure delivers solid recovery and replication services to ensure business continuity. But before implementing Azure for your organization, we recommend a few simple tips to making the process that much smoother… Develop an Implementation Roadmap When it comes to implementing a new cloud computing platform…

Read More

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by…

Read More

Phishing – you’ve probably heard of it. It’s one of the most common types of cyber attacks and users are constantly warned about its dangers. It’s so prevalent, in fact, that many cloud email providers (think Gmail and Yahoo!) provide an alert within any suspicious looking message that it may be a Phishing attempt. Commonly,…

Read More