Blog

Check the list of free ransomware decryptors

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands.

Order management systems and eCommerce

Order management systems and eCommerce

If business value is all about the long-term health and well-being of your company, there are few things more important than getting your product into customers’ hands swiftly and efficiently. Thankfully, modern technology has revolutionized these tasks and how you add value to your business.

Critical compliance factors for banks with mobile banking capabilities

Critical compliance factors for banks with mobile banking capabilities

Banking technology radically changed the way consumer and corporate clients do banking. With the introduction of internet banking, physically visiting a bank branch became an alternative rather than the norm. And because online banking has proven to be beneficial to both banks and clients, mobile banking -- an even greater innovation and a logical next step to banking -- was born.

Beware of the Cloudbleed bug

Beware of the Cloudbleed bug

Cloudflare, an internet security services company, found a major bug in its software that leaked sensitive data like cookies and passwords from client websites. Although investigation into the security flaw, also known as Cloudbleed, is still underway, early reports found that malicious hackers have not exploited this vulnerability.

Are SDN & network virtualization the same?

Are SDN & network virtualization the same?

Nobody’s perfect, even IT technicians. We’ve seen plenty of people interpret software-defined networking and network virtualization as the same exact service, but it’s time we clear up the difference. It’s small, but it could be the difference between major cost savings and a small increase in functionality.

WebRTC vs VoIP: competing or complementary?

WebRTC vs VoIP: competing or complementary?

Although some critics are labeling the newest tool in the internet-based telecommunications field a “VoIP killer,” nothing could be further from the truth. The reality of the situation is that this new technology, WebRTC, is here to make it even easier for customers to contact your business using the internet.

DCI Ranked in Top 100 List of Financial Technology Companies

DCI Ranked in Top 100 List of Financial Technology Companies

– iCore360® Developer Continues to Gain Industry Attention for Award-Winning Tech –

HUTCHINSON, KAN., October 5, 2016 – Data Center Inc. (DCI), the privately-owned developer of iCore360® core banking software and related technologies, has been ranked as one of the 2016 IDC Financial Insights FinTech Rankings top 100 technology providers to financial institutions worldwide.

Is your disaster recovery plan up to par?

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of useful information.

WordPress websites under attack

WordPress websites under attack

It’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks.