Blog

What is the right cloud service for you?

Businesses around the globe have been moving toward the cloud and are reaping the benefits of continuity, data security, and process efficiency. However, with more data comes more responsibility. This means that you’ll need to find the right kind of service that’s suitable to the infrastructure you have. Fortunately, various cloud management tools and solutions […]

RESULTS Technology Joins National Cybersecurity Initiative

RESULTS Technology has joined the National Cybersecurity Awareness Month (NCSAM) initiative, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to […]

Cybersecurity can be daunting…but there’s light at the end of the tunnel.

Cybersecurity

We hear a lot of talk about data security because of the constant threat of cyber attacks and hacking. News of data breaches are extremely common. You may find yourself dwelling on the threat … what would you do in the event of a disaster? How would you access your data? Luckily, there is a […]

What you need to know about juice jacking

We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this […]

10 Important virtualization terms

Virtualization — the process of creating a software version of a hardware component such as a server — is one of the most beneficial tech solutions for small organizations. For many business owners and managers, however, this is a vastly complex concept that comes with some pretty heavy jargon. To help, we have come up […]

Free removal of ransomware? Yes, it’s a real thing.

cyber security

Over the last few years, different versions of ransomware have sprung up, all aimed at extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is if there’s a free cure for the ransomware that infected your systems. The state of ransomware […]

4 Virtualization myths you shouldn’t believe

Explaining the concept of virtualization is no easy task and failed attempts to do so have left it with a less-than-ideal reputation. We want to set the record straight about virtualization’s many benefits by dispelling four of the most common misconceptions about it. Myth #1 – Virtualization is too expensive for SMBs Many people assume […]

Hackers are attacking MSPs. Here’s what we’re doing about it.

cyber security

If you’ve been reading the news lately, you know that more than 20 Texas municipalities were recently infiltrated by hackers demanding, collectively, a $2.5 million ransom causing some of these entities to temporarily cease all operations and pay the demanded ransom. Investigators have identified that the single hacker gained access to the various networks through […]

Advanced anti-phishing features for Gmail

While cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that asks recipients to reveal personal information or download an attachment containing malware. Happily, Google has further improved Gmail’s […]