2013 Data Breaches You Didn’t Hear About
You have probably heard of the big data breaches of 2013 – Adobe, LinkedIn, Facebook, Target and Snapchat-- but lets take a look at the ones you might not know about. The post 2013 Data Breaches You...
View ArticleHow Does Your Network Stack up Against the Sochi Olympic Village?
As the Olympics get underway in Sochi, millions of people are ascending into the Russian city, and with all of those connected devices, it’s the ultimate test for IT teams and their infrastructure....
View ArticleVirtualization Vs. Cloud: How Onsite Virtualization Affects Cloud Adoption
While virtualization is the foundation of cloud computing, recent reports are finding that virtualization is affecting cloud adoption in that more businesses are opting to virtualize rather than...
View ArticleHalf of IT Security Issues are Caused by Human Error– How Do We Fix This?
One of the biggest threats to IT security isn't hackers, it's employees. What can a company do to make employees more aware of IT security at work? The post Half of IT Security Issues are Caused by...
View ArticleAre Tech-Savvier Employees Less Secure?
Ever get so comfortable doing something that you end up cutting corners? That’s what Mike Kane says is happening to your tech-savvier employees when they are accessing cloud applications. The post Are...
View ArticleWe Know it Took a Lot to Build an Olympic-sized Network, But Did Everything...
As you may recall, just as the Sochi Olympics began, we had a look at what it takes to build a communications network of Olympic proportions. With the Sochi Olympics over, we once again asked Avaya’s...
View ArticleHow Do You Balance Risk and Finance?
Most decisions companies make have aspects of both finance and risk, making it imperative to a company’s next move to have chief risk officers and chief finance offers as close to perfect harmony as...
View ArticleGetting Word Out: How Social Media Aids Disaster Communication
Social media platforms like Facebook and Twitter are already a go-to source for people who want quick information from outlets such as government officials and news outlets, but it can also be a great...
View ArticleFive Things Every Business Continuity Plan Needs
Part of having a good business continuity plan is ensuring that when disaster strikes, the company is back up and running again like it had never gone down in the first place. Here are five things you...
View ArticleFuture Trends in Backup and Disaster Recovery
I guess it is safe to say that the cloud is where many people and companies choose to back up their data today (not before a good local backup, of course), but it got me thinking where will they put...
View ArticleTop 6 Challenges to the IT channel
Whether it’s a reseller, managed service provider, original equipment manufacturer or distribution partner, there are many things affecting the channel today. These are the biggest challenges. The post...
View ArticleThe Accounting and Finance Industry: Another Opportunity for MSPs
It seems like the accounting and finance industry is being hit by all sides when it comes to keeping important data secure and complying with numerous regulatory requirements, making it a great...
View ArticleDo You Have Misconceptions About Malware?
Malware is common, and is becoming more common. Even still, there are plenty of popular misconceptions about the threat of malware. The post Do You Have Misconceptions About Malware? appeared first on...
View ArticleHow the Pros Determine Hard Drive Failure Rates
Having the guts of your computer peter out at any time is not fun. Experts say hard drives are the least reliable, which means hard drive failure is common. So is there a way to determine just how long...
View ArticleHow the Medical Industry Fills the Tech-Education Gap
How do companies deal with hundreds, or perhaps thousands, of workers logging into computers and accessing patients’ personal information, especially when some may have never used a computer? The post...
View ArticleYes, Even Networked Healthcare Equipment is Hackable
The next time you are in the hospital, remember this terrifying thought: It is actually pretty easy to hack into medical equipment. The post Yes, Even Networked Healthcare Equipment is Hackable...
View ArticleSecuring Non-Traditional Computing Environments– Or… Not
Many non-traditional computing environments (ATMs, even nuclear missile systems) rely on older technology. What are the associated security concerns? The post Securing Non-Traditional Computing...
View ArticleThe Perks of Using Outdated Technology
From controlling nuclear missile systems to writing best-selling novels, outdated technology still has it's place in the world. The post The Perks of Using Outdated Technology appeared first on...
View ArticleBring Your Own Network: The Next BYOD?
Bring your own network and BYOD go hand-in-hand. Let's explore what this means for businesses still struggling to hop on the BYOD bandwagon. The post Bring Your Own Network: The Next BYOD? appeared...
View ArticleWhat is the Intercloud?
The “intercloud” seems to be the new buzzword in talk of the cloud, but what exactly is it and how will this affect business for IT providers? The post What is the Intercloud? appeared first on...
View ArticleHow Can You Take Your Privacy Back?
Edward Snowden definitely set off a wave of discussion about privacy. and many people are not waiting for legislators to figure out. Instead, they're taking matters into their own hands. The post How...
View ArticleDealing with Small Disasters: Power Outage
Not every disaster is big. In fact, some of the smallest ones are also the most common. Here are a few ways businesses can plan to deal power outages. The post Dealing with Small Disasters: Power...
View ArticleTech is Transforming the Retail and Grocery Industry
Here are some technologies changing the retail and grocery landscape. Where there's new technology, there's new opportunities for MSPs. The post Tech is Transforming the Retail and Grocery Industry...
View ArticleIs Cloud Storage as Safe as We Think?
Are Google Drive, Dropbox and other cloud storage apps safe enough to use both inside and outside the company to send proprietary information back and forth? The post Is Cloud Storage as Safe as We...
View ArticleCirque Du Soleil Talks Tech with StorageCraft
We were really curious what types of IT needs Cirque Du Soleil has, who handles it, and how they make sure everything goes off without a hitch, so we asked them. The post Cirque Du Soleil Talks Tech...
View ArticleA Few Lessons about Using AWS and Other Cloud Providers
What sort of measures are in place from Amazon or other hosting companies to prevent hackers or cyber-criminals from getting full access to your systems? The post A Few Lessons about Using AWS and...
View ArticleHow Do We Get More Women in the Tech Industry?
Not a lot of women are entering science and technology fields. What needs to happen before we find more women in these roles? The post How Do We Get More Women in the Tech Industry? appeared first on...
View ArticleThe Rise of the Sharing Economy
For every service we humans needs, from a house to stay in to a ride to a sitter, there is a startup that is changing the way to do things, and it's all a part of the sharing economy. The post The Rise...
View ArticleThe History and Future of Networking
In the grand scheme, networking is still a pretty new concept. Here's a look at it's interesting history and future. The post The History and Future of Networking appeared first on Storagecraft.
View ArticleWhat’s Causing the Flash Storage Market to Grow So Quickly?
While tape and hard disk drives are traditionally seen as the most inexpensive options, flash can actually be more cost effective in some cases. The post What’s Causing the Flash Storage Market to Grow...
View ArticleDoes Your Company Need Some Tech to Keep Organized?
Organization is something humans strive to do, but often realize it can be just out of their grasp. These days that doesn't always have to be the case. The post Does Your Company Need Some Tech to Keep...
View ArticleBest Practices for P2V Migrations
Now that we know virtualization is awesome and can help businesses save money, you might be thinking of migrating your physical machine to a virtual one. There are a few pretty simple ways to go about...
View ArticleHiring the Perfect IT Admin
If you are considering hiring an IT or network administrator, this week column is right up your alley. The post Hiring the Perfect IT Admin appeared first on Storagecraft.
View ArticleDo you Need a Storage Management Policy?
Businesses store an awful lot of data these days. Is it time to implement a storage policy to help manage this blossoming data? The post Do you Need a Storage Management Policy? appeared first on...
View ArticleSomebody is Watching You: Understanding and Keeping your Privacy
We spoke with some experts in the information security field about what companies are doing-- or should be doing-- to keep data completely secure. The post Somebody is Watching You: Understanding and...
View ArticleIs the Internet of Things Just Big Brother in Disguise?
Daniel Gutierrez, chief data scientist for Private.me, answered some of our questions on the Internet of Things, big data, and more. The post Is the Internet of Things Just Big Brother in Disguise?...
View ArticleMillennials Value Their Privacy — Until it Involves a Reward
Millennials have essentially grown up with a phone in their hands, and they are constantly using it to send texts, take photos, and share every detail of their life on social media. Do they really...
View ArticleIf Corporations Won’t Protect Consumer Privacy Can MSPs?
Corporations collect personal data for many reasons, but MSPs don't have to sit idly by while consumer privacy dissolves. The post If Corporations Won’t Protect Consumer Privacy Can MSPs? appeared...
View ArticleIs Hybrid Hosting a Fit for Your Service Offering?
Hybrid hosting is one way companies are keeping data more secure, but is it something that fits in with your managed service offering? The post Is Hybrid Hosting a Fit for Your Service Offering?...
View ArticleWhat IT Risks are You Overlooking?
There’s a lot to consider when you are talking about safety and security: Failures, heat, human error, power, etc., but what are some things that are commonly overlooked? The post What IT Risks are You...
View ArticleNew Terms in the Disaster Recovery Space or Just New Names for Old Concepts?
There are a few new terms floating around the business continuity and disaster recovery space, but are they really new? The post New Terms in the Disaster Recovery Space or Just New Names for Old...
View ArticleTesting Employees’ Cyber Security Knowledge
How do IT admins test employees to see if they are being safe computer users? Here are a few ideas. The post Testing Employees’ Cyber Security Knowledge appeared first on Storagecraft.
View Article5 Best Tech Releases of 2014
We pulled together some of the best of the best from this year as reported by various media. Here's a look. The post 5 Best Tech Releases of 2014 appeared first on Storagecraft.
View ArticleHere’s Some Tech You May Not Have Heard About in 2014
Here are a few types of tech that you may have missed. The post Here’s Some Tech You May Not Have Heard About in 2014 appeared first on Storagecraft.
View ArticleWho are the Most Prominent Hackers and What Motivates Them?
Cyber attacks happen all the time, but who are some of the most prominent hackers around and why do they do it? The post Who are the Most Prominent Hackers and What Motivates Them? appeared first on...
View ArticleWhat Can Businesses (Particularly MSPs) Learn from This Year’s CES?
CES might be over, but the tech there will continue trending and with its rise comes opportunities for managed service providers. The post What Can Businesses (Particularly MSPs) Learn from This Year’s...
View ArticleThe Low Down on Virtualization and Containers
Containers are back! This old technology is becoming new again as companies are pairing it with virtualization to run multiple isolated systems through one host. The post The Low Down on Virtualization...
View ArticleUpgrading Your Site or App? It Might be Time to Hire a Freelancer
Revamping a website, looking for a way to offer more services or creating your own app could cause you or your clients to seek some outside help. The post Upgrading Your Site or App? It Might be Time...
View ArticleIT Services in the Legal Industry: Seven Tips to Get Started Today
Law firms use all kinds of applications and operations to make sure their case files are handled properly so they meet those critical deadlines. And many times, that means they will need a managed...
View ArticleRMM and PSA Tools
As management of a company’s information technology system has shifted to third parties, you might notice the IT guy slipping in and out every so often. The post RMM and PSA Tools appeared first on...
View Article
More Pages to Explore .....