Dangerous Adware - What to do if Infected
The term adware originated from the contraction of the terms advertisement (advertising) and software. Adware falls under the heading of malware and is primarily not dangerous, but very inconvenient...
NetApp: The Importance of Trust and Security
Author: Mike Scanlin, Information Assurance Program Manager, NetApp, Inc. NetApp understands the importance of security. “Trust but verify” is the foundation for NetApp’s position as the #1 provider...
The Impact of Windows Server 2016 on Data Recovery (Pt. 1)
Microsoft released its final Windows Server 2016 version a few weeks ago. It comes in three editions – Windows Server 2016 Standard, Windows Server 2016 Datacenter, and Windows Server 2016...
Data Breach and Cyber Attacks – what impact does it have on companies?
A Data Breach or a breach of data security is the viewing or stealing of sensitive, proprietary or confidential information by unauthorized third parties. This form of crime can both cause damage of...
Managing Your Digital Footprint in the Age of Technology
We live in a digital age where creating data has almost become second nature to the human race. Whether it’s Facebook, LinkedIn, or Twitter etc., the list is endless and vehicles to essentially...
The Challenges of Exchange Migration
To upgrade or not to upgrade… System upgrades, whether we like them or not, are a necessary part of our technological world. However, in an effort to save costs, many organizations hold back from...
Data Migration: What to Consider When Moving Your Data
When it comes to enterprise technology, “out with the old and in with the new” is easier said than done. Any time a company decides to update its software, operating systems, servers, storage methods...