Email scams have been around almost as long as email itself. But each year, just as users think they know what to look for to keep themselves out of harm’s way, cyber criminals come up with a more advanced, harder to detect style of attack. Each year, Mimecast, a...
How do VLANs (or virtual lans) work? This is a common networking question. But, before we dive into the particulars of how they work, you need to understand what they are, the purpose of VLANs and the differences between the available types. Let’s get started. What is...
Basic Overview of Ransomware and What to Do if You Fall Victim Ransomware is malicious software that encrypts a user’s files (and any files that users has access to on a shared drive) and forces the user to pay a “ransom” in exchange for the decryption key to get the...
If your business is still running applications on a Windows 2003 Server (Win 2K3) you need to decide now what you’re migration plan is since Windows server 2003 end of life becomes a reality on July 14, 2015. As I’m sure many of you know, Microsoft has a...
Recent Comments