Technology Advice for Small Businesses

Google weighs in on account hijacking

According to experts, passwords shouldn’t be the only way you defend your accounts. After all, hackers have plenty of tricks and tools to steal them. So to help businesses fully understand the risks involved, Google conducted a study on the causes of account hijacking. The results From March 2016 to March 2017, Google and UC… Continue reading Google weighs in on account hijacking

Google releases year-long security study

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details. The results From March 2016 to March… Continue reading Google releases year-long security study

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results. The results From March 2016 to March 2017, Google and UC Berkeley… Continue reading Google studies effects of leaked logins

What you can learn from Equifax’s leak

When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn’t experience the same fate as the giant, bumbling credit bureau. What happened to Equifax? Equifax,… Continue reading What you can learn from Equifax’s leak

Equifax sheds light on incident response

What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same… Continue reading Equifax sheds light on incident response

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this:… Continue reading Equifax’s Leak: lessons learned

Get fat savings with thin and zero clients

When you have several cost-effective options like cloud computing and managed services providers, IT spending should never get out of control. And if you want to cut back even further, trade in your expensive desktops for thin and zero clients. What are thin and zero clients? Thin clients are stripped-down computers with minimum processing power… Continue reading Get fat savings with thin and zero clients

Cut IT costs with thin and zero clients

Everyone knows that one way to increase your profit margins is by cutting costs. When it comes to tech, most businesses reduce cost by moving their operations to the cloud, hiring pay-as-you-go service providers, and uninstalling unnecessary software. However, there’s another way you can reduce costs. Consider swapping your bulky desktops for thin or zero… Continue reading Cut IT costs with thin and zero clients

How thin and zero clients save money

Businesses are always looking for ways to cut costs without sacrificing growth. For the longest time, many believed that they had to purchase workstations with its own processing power, RAM, and hard drive. But thanks to virtualization, companies can save money and get the computing processes they need with thin and zero clients. What are… Continue reading How thin and zero clients save money

The truth about healthcare security

While many small businesses mistakenly think they’re immune to data breaches because of their size, and therefore put minimum protection in place, healthcare organizations can’t ever risk taking this laissez-faire approach – and they’d be in trouble if they did. After all, there are rules and regulations when it comes to healthcare IT systems, and… Continue reading The truth about healthcare security