NSA to secure phones with virtualization

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization.

Data loss prevention tips for Office 365

Data loss prevention tips for Office 365

Office 365 is a complete cloud solution that allows you to store thousands of files and collaborate on them, too. In addition to its productivity features, Office 365 comes with security and compliance solutions that will help businesses avoid the crushing financial and legal repercussions of data loss.

How did WannaCry spread so far?

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.

Trojan infects macOS version of HandBrake

Trojan infects macOS version of HandBrake

If you’ve downloaded the macOS version of HandBreak, a popular video transcoding program that converts multimedia files into different formats, checking your computer’s safety right now would be wise. Users who downloaded the program between May 2 and May 6 have a 50 percent chance of being infected with an Apple Trojan, based on an announcement on HandBrake’s website.

Protect your data from WannaCry

Protect your data from WannaCry

This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the ransom. What’s more alarming, however, is that the global success of this malware will likely spawn even more potent variants.

How good is your web browser’s security?

How good is your web browser’s security?

Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start.

Server management: 4 essentials

Server management: 4 essentials

By their very definition, servers are tasked with managing significantly higher burdens than the average desktop workstation. If your business has a server onsite, there are so many things you need to consider to get the most out of your investment. Read on for a few of them:

Mount your servers properly

Small businesses are usually forced to prioritize the here and now over long-term planning.

Containers in Windows Server 2016

Containers in Windows Server 2016

If you’re a business owner interested in utilizing virtualization technology, you have a lot of options for how to go about that. However, there is one virtualization vendor you’re probably already comfortable with: Microsoft. Read on for more information on the new and exciting features packaged with the Windows operating system.