Posts by Dan

IT Security: Companies increasingly yield to ransomware demands

IT Security: Companies increasingly yield to ransomware demands

   That strategy may only embolden cybercriminals, who view stolen or encrypted data as a powerful weapon.   Faced with...

IT Solutions: Shortened URLs make it easy to spy on people

IT Solutions: Shortened URLs make it easy to spy on people

   Security researchers find six-character short URLs expose your personal data to anyone who looks.   Security researchers have discovered...

IT Solutions: New software can tell if you are using bad USB Type-C cables

IT Solutions: New software can tell if you are using bad USB Type-C cables

   The authentication system can protect your devices and your wallet.   Subpar USB Type-C cables could fry your devices...

IT Solutions: 5 Reasons to Replace FTP File Sharing now with Acronis® Backup & Recovery™

IT Solutions: 5 Reasons to Replace FTP File Sharing now with Acronis® Backup & Recovery™

   Many companies and employees use File Transfer Protocol (FTP) servers to share and receive files, data and documents –...

IT Solutions: D-Link – Professional IP Surveillance Solutions

IT Solutions: D-Link – Professional IP Surveillance Solutions

D-Link, the cost-effective, standards-based unified networking solutions provider for small business and medium enterprise IT environments, today announced the expansion...

IT Solutions: Dell Solutions – Storage Backup, Application and Networking

IT Solutions: Dell Solutions – Storage Backup, Application and Networking

At its first Dell Storage Forum event in Europe, Dell today announced advancements in its Fluid Data™ architecture that enable customers to...

Cloud and disaster recovery: Load-balanced data centers are not a perfect solution

Cloud and disaster recovery: Load-balanced data centers are not a perfect solution

A growing trend in the disaster recovery arena for cloud providers is the use of load-balanced data centers instead of...

IT Solutions: Data Deduplication – An Essential Component of your Data Protection Strategy

IT Solutions: Data Deduplication – An Essential Component of your Data Protection Strategy

Organisations are facing many challenges when it comes to managing and protecting their business data. According to various industry experts, companies...

Cloud network: Can Microsoft tame the mighty VMware beast?

Cloud network: Can Microsoft tame the mighty VMware beast?

Takeaway: Microsoft wants to own the cloud. But since clouds are built on virtual platforms, that means they need to...

IT Security: Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint

IT Security: Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint

In the constant drive for increased productivity and cost effectiveness, enterprises are continuously asked to do more with less. As...

1 12 13 14 15