Millions of XP-Based PCs Are Vulnerable to Attacks

Many Windows XP users were unhappy with the next release of the operating system, Windows Vista, and they refused to upgrade. Though versions since Vista have evidently taken consumers’ concerns into account, a significant number[…]

keep Reading

Encryption Legislation Receives No Support From White House

Division among federal agencies concerning encryption is at least partially responsible for the Obama administration’s reluctance to neither oppose nor support legislation that makes it easier for judges to force technology companies like Apple to[…]

keep Reading

Strategic Thinking and IT Leadership

I came across a video interview recently that touched on the topic of strategic thinking in information technology. The interview was conducted at this year’s World Health Care Congress in Washington DC, but the point[…]

keep Reading

Data Backup Is A Requirement

Data backup is a requirement, especially when managing sensitive information. If primary versions of the data are lost, backup systems can recover the information. Server virtualization is emerging as an excellent option in disaster recovery[…]

keep Reading

What Is A vCIO?

The Chief Information Officer of a company, usually referred to as the CIO, is responsible for strategic IT planning, analysis, and overall information technology management. However, employing someone in this executive level position is normally[…]

keep Reading

Why Do You Need A Business Continuity Plan?

No one ever expects a natural disaster to come and wipe out a business entirely. That being said however, oftentimes it is this false sense of security that ends up ruining businesses that do not[…]

keep Reading

Email Scams, is Your Business at Risk?  

Email is perhaps the most popular and most important means of communication for any business in any country in just about any industry. Email is one of the unifying factors that brings all industries together[…]

keep Reading