What is Amazon AppStream 2.0?

Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever. Amazon AppStream 2.0 is one such solution, and here’s why it’s worth looking into. What is it? Initially […]

Google unveils sweet new Android OS update

Google has revealed Android Oreo, the next major OS update. The software builds upon the success of Nougat, offering new features and upgrades to smartphones and tablets. If you have an Android device and want to know more about the Oreo update, here’s a quick rundown, including how to get it early. Picture-in-picture mode First […]

Azure is getting a new type of container

Virtualization has moved out of the server farms owned by big-name enterprises and onto the wishlists of small- and medium-sized business owners. As a subset of virtualization, container technology is benefitting from this commercialization and becoming more accessible to everyone. What are virtual containers? Virtual containers are isolated computing environments that contain the bare minimum […]

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Data Loss Can Cause You To Shut Down

Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]