On a fine spring day, the Master and the User were strolling through a garden when the User received a text message. The User said to the Master, “I really don’t understand your apprentice, Jack. Here, look at this message,” he said, handing him the phone. It read: IDK USB O PS/2 1 BA INN O 2 JLMK CUL8R THX J.
Zen and the Art of IT Support - Response
Excited, the first apprentice, named Jack, jumped right into his Master’s training network. Jack asked, “Master, some User keeps calling me saying they have trouble with their printer. How do I get them to quit bothering me?”
Network Virtualization: Don't Try this at Home
More and more organizations are turning to virtualization as they face an increasingly complex IT environment. Enterprises of all sizes have found that relocating their operating, network and/or hardware resources to an offsite host server provides an array of business benefits.This virtualized IT environment can lead to reduced capital and operating costs, flexibility in the allocation of system resources to meet changing requirements, the ability to quickly integrate legacy and new systems, and scalability for expanding operations. Another key but often-overlooked advantage of using virtualized machines in an enterprise-level data center is the improved data and network security provided to an organization.
Despite the common misconception that virtualization increases security risk, in actuality today’s virtualized networks can be much more secure than an entity’s in-house network. This is particularly the case in an IT ecosystem where threats originate from evolving network technologies, protocols and devices, as well as sophisticated hackers and data thieves, internal breaches, hardware and software failures, business partner security breaches and even natural disasters.
To Virtualize, Or Not to Virtualize?
To Virtualize, Or Not to Virtualize?
Hamlet never would have asked this specific question, but in today's world it's really important if you’re running a small business. Most businesses we work with feel overwhelmed as to where to begin when it comes to Virtualization. As recently as a couple of years ago, clear-cut best practices let you know where you should start and what things you should during virtualization. Almost everything is up for grabs these days. Given these changes, how do you, the virtualization newbie, decide what to view? If you are unsure if you should head down the virtualization path or not, here are three helpful questions that will help you decide if it's time.
The Negative Effects of SPAM
1978: Earliest documentation of spam
Next-Generation Firewalls
Next-Generation Firewalls
The humble firewall has come a long way since the packet-filtering days, originally founded in the 1980's. These early firewalls operated mainly on the first four layers of the OSI model, intercepting traffic and inspecting the properties of every packet to determine if they matched a pre-configured set of rules. Firewall development did not take a breather between then and the next-generation firewall of today. In fact, the ride from there to here has been largely organic – developments in firewall technology, intrusion detection and prevention, and user or content management have all been assimilated into the unified threat management (UTM) platform of today.
This Tech Tip addresses some frequently asked questions about how to safeguard your computer data on a personal and business level. First, it makes sense to designate one or two specific folders on your computer as the main folder for confidential file back-ups for several reasons.
Hurricane Season is Here... Who Cares, Really?
At the end of June, I was in the garage looking for 4th of July decorations (per my wife's instructions) and I couldn't help but notice the hurricane shutters in the corner. As a Florida native, I have seen the terrible destruction that hurricanes can bring homes and businesses. And predictably, the "disaster marketing" engine started up last month with questions like "Are you ready for hurricane season?"
Cyber Security Workshop Coming to Businesses Near You
Last week, our own Master of Disaster, Jonathan Garber, presented a Cyber Security Workshop for the Florida Institute of CPA’s (FICPA). This was a CPE-certified course reviewing common system threats, with a general overview of all aspects of cyber security.
Tech Tips - May 2014
Time-Saving Tech Tips for Your Keyboard!
You're going to love these tips! Check out some cool typing and keyboard shortcuts – some simple time-saving tricks you may not be aware of: