Change layout
Don’t miss new articles!
Thank you for subscribing!
Comprehensive Guide to Password Security blog header

Comprehensive Guide to Password Security

Comprehensive Guide to Password Security

More than half of all data breaches happen because of weak passwords.

Bad passwords are a headache for any system administrator whose users are allowed to modify or change them. At the same time, weak password management is a pain for the company as a whole, since malefactors are on a constant lookout for weaknesses they can breach. Continue reading

Don’t miss new articles!
Thank you for subscribing!

3 Steps to Choosing a Cloud Storage Provider

3 Steps to Choosing a Cloud Storage Provider

There is no cloud storage solution that fits all the needs of your company. No solution is built to store data backups and be used as a file-sharing and collaboration service at the same time. Sure, you might try using Microsoft OneDrive or Dropbox for Business for backups, or set up AWS Amazon S3 for file sharing but, in most cases, that would end up as an inefficient, expensive and insecure solution. In this article, we will define how you should choose a cloud storage provider, based on your unique needs. Continue reading

News You Might've Missed

News You Might’ve Missed. 19 – 22 Apr

News You Might’ve Missed. 19 – 22 Apr

What's new this week in the news for MSPs? REvil ransomware allegedly strikes Quanta Computer, takes blueprints for Apple; hacking campaign against Pulse Secure VPN devices breaches government agencies; Qlocker ransomware attack leverages 7-Zip to encrypt QNAP devices; and Codecov supply-chain attack hacks hundreds of networks, according to reports. Continue reading

How to Mitigate BYOD Problems

How to Mitigate BYOD Problems

“Bring your own device”, or BYOD, is a situation where a company's employees use personal devices to access corporate network resources or applications. These devices typically include mobile phones, tablets, and laptops. The BYOD approach can occur intermittently, meaning that some employees enter corporate resources from time to time, without notifying their system administrators. In such cases, ”bring your own device” can be a serious security issue for the company. Continue reading

Load more