Insights, updates, and deep dives into cybersecurity, cloud technology, and AI innovation.
Cloud Computing for Small and Medium Businesses: Meeting Specific Needs Cloud computing is the future. Many businesses and a wide range of industries are now relying on cloud computing for anything from data storage to real-time operations. This is due to the fact that cloud computing can host many web applications while providing a cost-efficient […]
Midsize businesses are realizing the power of cloud computing–a flexible, cost-effective and proven platform for delivering IT services and products over the web. However, they are also facing tighter budgets, fewer resources and more competition. Now, more than ever, there’s a real need to achieve greater efficiency at lower cost–while also minimizing the risks. Utilizing […]
 Start FileZilla. I’m using FileZilla 3.5.0 for this tutorial, but the steps should be the same in any recent version. We will start by creating a new site in FileZilla so that we won’t have to fill the credentials every time we would like to connect to the server. Open File > Site Manager… and […]
cPanel has an array of fairly impressive scripts located in /scripts . When having disk quota issues, running /scripts/fixquota allows to return the cPanel server to a state allowing to alter the hosting plans and disk space quotas.
Cybersecurity is complex and affects business.  If you are an executive, have you considered whether you are fulfilling your fiduciary duty through cybersecurity strategy?  If you are a CISO, have you taken a methodical approach to every increasing cybersecurity topic?  If you are a non-IT person, have you wondered whether your enterprise information is secure? […]
There are no boundaries to data loss, it happens to companies of all shapes and sizes, from large corporations to small startups. The main issue with data loss is the fact that it can strike at any time, resulting in a domino-like effect of serious consequences for the business. Wondering how data loss can impact […]
Often times people need to receive email for multiple valid variation of their email addresses. On most email systems, these are called email aliases. IBM Domino has a slightly unusual way of allowing system administrators to define aliases: Open the Domino Administrator Tool On the People & Groups tab, select People Edit the Person document […]
The key benefits from deploying an enterprise social media software are to improve customer satisfaction by building stronger relationships with customers, staff effectiveness by simplifying access to existing internal expertise, staff retention by allowing employees to build a stronger network and stronger relationships within the enterprise. Atlas for IBM Lotus Connections is a social networking […]
The sudden increase in cyber attacks happening all around the world is not without its reasons. More than 80% of information – including private details about ourselves – are now stored digitally. Every information is valuable to attackers, which is why we are now seeing more attacks as well as new forms of attacks targeting […]