Blog

Hardware flaws affect browser security

Hardware flaws affect browser security

In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.

Gear up your network equipment with UPS

Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.

Spectre and Meltdown vs. virtual desktops

Spectre and Meltdown vs. virtual desktops

On January 3, 2018, two hardware flaws were announced that affect nearly every computer sold within the last 20 years. Every virtualization service available relies on vulnerable computers, but you needn’t worry — almost every vendor has already protected your virtual machines.

Artificial intelligence to reshape VoIP

Artificial intelligence to reshape VoIP

Incorporating Artificial Intelligence (AI) in internet phone systems seems like the logical next step to improving business telecom. However, it’s only now that businesses are truly embracing such hi-tech advances in VoIP. AI developers are paving the way for automated processes that have the potential to significantly enhance VoIP performance.

The risks of auto-complete passwords

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns.

What’s set for hybrid cloud this year?

What’s set for hybrid cloud this year?

Cloud technology has seen continuous adoption in 2017. In fact, business owners are starting to embrace hybrid cloud so much that 2020 is expected to be the year when combined private and public cloud spending will exceed traditional data centers. But until then, here are five hybrid cloud predictions for 2018.

Clearer strategies

Many infrastructure as a service (IaaS) public cloud vendors have spent 2017 refining their hybrid cloud strategy.

It’s not too late to cash in on 2017’s IT trends

It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment.

What are Virtual Containers?

What are Virtual Containers?

Virtual containers have recently gained prominence with the open-source container platform, Docker. It promises to change the way IT operations are carried out, just like virtualization technology did a few years ago. Read on to know more about this revolutionary breakthrough and how it can help your business.

5 types of VoIP services you should know about

5 types of VoIP services you should know about

Most business owners and individual users know that making calls via VoIP is cheaper and more feature-rich when compared with the old landline telephony system. Still, you might be unaware of the VoIP service options out there, not to mention how to determine the right one for your needs.

Are the encrypted sites you visit safe?

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites.