News
Phishing Evolves: Best Practices to Avoid Being Phished
A few weeks into my tenure at Core Technologies, I received an email from Fidelity alerting me that my 401(k) account needed action. It stated that I needed to activate my account within 2 weeks or I would lose matching for the year. Being new to the company, I...
EIS
GSA Awards 10 Enterprise Infrastructure Solutions Contracts August 1, 2017 15-year, $50 billion contract provides agencies with comprehensive mission-critical IT & telecom services WASHINGTON, D.C. – The U.S. General Services Administration (GSA) today announced...
Exchange 2003’s End-of-Life: One Month Later
It’s been a month since Microsoft ended support for Exchange 2003. I’ve seen quite a few articles and forum threads offering instructions for upgrading on-premises Exchange 2003 to Exchange 2010 or 2013. And from what I gather reading the forums, a lot of folks are...
Get the best of both worlds: SecuriSync & File Servers
Traditional file servers became popular in the business world because they facilitate access to files inside a company’s network. But businesses have evolved, and employees need mobile access to files from the device of their choice. File servers cannot meet the...
Ransomeware Threats on the Rise in 2017
What does the cloud, “Breaking Bad”, Australia, and bitcoins all have in common? If you are up-to-date on current cyberattack trends around the world, you may have heard about the “Breaking Bad” themed ransomware attack currently spreading like wildfire through...
HIPPA Compliant Office in the Cloud
When I’m talking with our customers and partners about healthcare and HIPAA, a frequent question is “What about your cloud-based voice services? Are they compliant with HIPAA requirements?” Discussing HIPAA requirements to protect sensitive patient information often...
What is Active Directory and why is it so important?
You might hear people talk about Active Directory™. Sometimes they refer to it as “AD”. Active Directory is a Microsoft® software that organizes and provides access to information in an operation system’s directory. It is a link between “objects” and “values”. That...
What you need to know about the VENOM security flaw
Another month, another mega-vulnerability. If you haven’t already heard about the VENOM vulnerability, you will. It’s being compared to Heartbleed and could have widespread security implications for cloud service providers. It’s certainly the largest vulnerability...
Do Ex-Employees Still Have Access to Your Corporate Data?
Organizations of all sizes have a problem that most of them are not addressing adequately: their employees store corporate data on various file-sharing and content access platforms and most of these people still have access to this data after they are no longer...
Who Creates Risk in Your Organization?
The New York Post broke incredible news this week: the AOL email account of the Director of the CIA was hacked. By a teen. Who “social engineered” Verizon to get the password. Now, every element of that story in and of itself is already incredible. But what made our...
A Great VoIP Experience Starts with Great QoS
When you pick up your phone you expect to hear that familiar dial tone sound and expect to be able to clearly hear the person on the other side, right? When that doesn’t happen, it’s a Quality of Service (QoS) issue, and we know how frustrating these types of problems...
What do SMBs really know about Hosted Phone Systems?
When 74 percent of small and medium-sized businesses rank voice communications as “extremely important to business operations” — you’d imagine that the adoption of cloud-based phone systems would be relatively high. But in the case of hosted PBX, IP telephony and...