Tools for online reputation marketing

Like the Loch Ness Monster, reputation marketing has long been considered a figure that is shrouded in mystery. Shai Aharony from Redboot Online sums it up as “tools that allow you to analyze, track, monitor and engage online activity, giving you the power to directly respond to customer complaints and turn potentially damaging feedback into […]

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and […]

Learn from this NFL team’s EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of […]

Creating online communities for businesses

Gamers require an effective strategy to thwart the boss, athletes require constant updates on the latest tournaments to improve performance and businesses require an online community to fully thrive. As the saying goes: ‘What comes easy won’t last, and what lasts won’t come easy’. This is especially true when you embark on building an online […]

Three client level virtualization options

Server-hosted delivery of client applications is hardly new. Whether it was Microsoft Windows Terminal Services back in 1996 or the Remote Desktop Services of today, it has been around for a while now. With client virtualization, boundaries of traditional networks are done away with to allow rich client applications and environments to endpoints. Keep centrally […]

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s […]

Key announcements from Google I/O 2016

Mayan priests took it upon themselves to inform the people of important matters such as festivals, harvest updates and when the next Quidditch tournament will be held – the same can be said about Google I/O just without the headpieces. Attendees are given the 411 on the latest announcements and newest products that have just […]

Windows Phone is calling it quits

Microsoft smartphones have been on their last legs for months, if not years. Though builds and new features held promise in revitalizing the device, Microsoft announced the removal of their phones from the consumer market. While Microsoft maintains its stance on “fully committing” to Windows Phones, the fact that they are selling off their handset […]