Blog

Why Look for Trouble? Doing a Technology Gap Review

June 13th, 2018

“But I’ve got managed IT services, a great help desk, and my servers are safely in the private cloud. Why would I need to do a Technology Gap Review?”

It’s a good question.  And the answer is another question:  Now that you’ve got your infrastructure all taken care of with designDATA’s help, what about the 43 other pieces of software you’re using to manage your organization? Are they all serving your mission and supporting your goals?

A Technology Gap Review takes a look at how you do business using technology.

Microsoft Office 365 to block Flash

Microsoft Office 365 to block Flash

A few weeks ago, Microsoft made an announcement to block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365. While the developers have their reasons for implementing this, they should have pulled this feature earlier to avoid many irate customers.

Cybersecurity and Today’s CFO

April 10th, 2018

CFOs can no longer respond with “that’s not my department” when it comes to cybersecurity. In a recent article by Harvard Business Review, CFOs were outed for not taking an active role in their organization’s cybersecurity efforts. Today’s financial executive must focus on more than managing financial risk—they must become an engaged member of the security team.

New scam freezes Chrome to panic users

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen.

How Facebook’s News Feed tweaks affect you

How Facebook’s News Feed tweaks affect you

Facebook’s newest action can mean bad news to businesses. The company had announced its decision to screen its News Feed to include less content from publishers and businesses and more from your loved ones. This comes after the allegations of how social media has unconsciously shaped people’s opinion and mental well-being.

Distributed spam hides illegal activities

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.

Virtual DR: The best anti-ransomware tool

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against […]

Beware of the Meltdown and Spectre patches

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you.

Gear up your network equipment with UPS

Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking […]

The risks of auto-complete passwords

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns.