Are your VMware machines up to date?

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case. VMware, one of the leading virtualization software vendors, […]

Change your Dropbox password

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong — passwords had been compromised as well. This new information came to light when the database was […]

New SMB dashboard app from Twitter

If you aren’t a celebrity or a multimillionaire capable of purchasing millions of Twitter followers, it’s quite hard to establish a notable online presence these days, especially if you’re a small- or medium-sized business. It’s undeniable that the benefits of a strong online presence on prominent social media platforms such as Twitter are numerous. With […]

2016’s Best CRM Software Options

What are the components of a good CRM software? Must it fit into your budget? Should it be easily navigable? Or must it have a simple interface? All the aforementioned qualities are vital, but none of them are important if they don’t meet all your business’s unique needs.The more pressing question is this: how would […]

Citrix’s XenApp gets a cloud boost from Azure

Microsoft’s Azure and Citrix’s XenApp have done a lot to move virtualization services into the mainstream over the years. So, with the announcement that the two companies will work together to combine their platforms into a new cloud-based application delivery system, it’s understandable why there is so much excitement within the industry. Let’s dig deeper […]

Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can […]

How does Microsoft FindTime really work?

Theoretically, scheduling meetings should be virtually hassle-free. But in reality, simply agreeing on a mutually compatible time is often an impossible task. On top of hectic schedules, you have different departments that have their own time constraints. What if there was a tool that could take care of all that for you? That’s where Microsoft […]

Network virtualization: why you should care

As difficult as virtualization may be to understand, it continues to march toward widespread adoption. Up until now, the service was mostly limited to making hardware and software resources better allocated based on needs. However, corporate bigwigs AT&T and Verizon are jumping into the game by adding the option to virtualize network services. We’ve broken […]

Best practices for SMB Facebook pages

Considering the most recent stats of Facebook’s daily usage — an astounding 1 billion daily mobile users, to be exact — it’s time to take another look at your company’s page. Even if you’re actively managing your page, changes and updates are so frequent at the social media colossus that there’s likely a feature or […]

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]