Author Archives: cdata

Redundancy: The Key to the Cloud’s Extraordinary Stability and Data Integrity

Redundancy is a central theme of all cloud technologies. It was a natural extension of virtualization, which allowed the encapsulation of entire servers into a single file, making them easy to replicate and move within clusters of physical servers. Virtualization, … Continue reading

Posted in Our Blog | Tagged , , , , , , , , | Leave a comment

Don’t Forget the Physical for PC Security

You guard against the loss of data by storing it on the cloud, implement security software to protect your computers against malware and require users to change their passwords every six months. However, these safeguards offer no comfort if a … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , , , | Leave a comment

Broadband Internet: Finding a Balance for How Much Bandwidth Your Business Requires

Broadband Internet is going to be important for how efficient your business becomes. As much as America seems to perpetually run behind other countries in broadband Internet speeds, you will ultimately have various options on how much broadband speed you … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , | Leave a comment

Importance of Malware Protection in the Cloud

As malware becomes more problematic, so is companies’ concern for protecting confidential information.  Malware threats have gotten worse since everyone is surfing the web.  It used to be on a USB stick or floppy disk.  Now malware is being created … Continue reading

Posted in Our Blog | Tagged , , , , , , , , | Leave a comment

Spam Filters Can Improve Network Security

Spam filters are not generally considered a security measure but as spam traffic increases, they may find correspondingly greater effectiveness in that capacity. It seems that every week, another major company is in the headlines after being hacked. Sometimes these … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , | Leave a comment

The Need for Encryption & Other Security Measures Highlighted by Verizon Study

A comprehensive data breach study by Verizon was released in October 2012. The study of 832 breaches across many sectors, including health care, was conducted in cooperation with the U.S. Secret Service, as well as Dutch and Australian authorities. When … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , | Leave a comment

Look To The Cloud For An Efficient Disaster Recovery Plan

  Disasters, both natural and man-made, have unfortunately been headline events recently. While protection of human life is always the priority, attention turns to the effect of catastrophic events on businesses. No business owner likes to think about the “what … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

The latest report on spam lets us know just how much we need spam filters

If there was any question in our minds as to the value of our spam filters, we got a look at the Spam Report from Kaspersky Labs for Q1 2013. Yeah, we definitely preferred it when spam was just a … Continue reading

Posted in Our Blog | Tagged , , , , , , , , | Leave a comment

End of XP is Near – What Next?

We all knew the day had to come. We just kept denying it was on the way. April 8, 2014 is the day that Microsoft will stop supporting our beloved Windows XP. Here’s what the gang at Redmond said about … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

Communications Infrastructure is Transformed by both VoIP and BYOD

Global subscribers to VoIP services reached the nine figure level in 2012. That’s over 100 million worldwide. Most analysts agree that in 2013 the number will double to over 200 million. This is the year the acronym for “Voice over … Continue reading

Posted in Our Blog | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment