Virtualizing your desktops comes with a number of benefits, one of which is improved security. Unfortunately, nothing perfect lasts forever, and the virtualization industry is facing a frightening new form of malware. Although this threat is nothing more than a facelift on an old virus, it is just as dangerous as it was the first […]
An old virus gets a new shot at virtualization
IT Radix Published in NJBA Dimensions Newsletter (Winter 2017)
We’re happy to be published in NJBA's Dimensions Newsletter (Winter 2017)! Click here and check out Page 9 for a taste of just some of the enhancements that Microsoft introduced in the past few months.
IG Stories: redefining online marketing
Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently announced its plan to experiment with video ads via Instagram Stories. Give your small- or medium-sized business a competitive edge by understanding and utilizing Instagram Stories.
Simplify calendar sharing with Office 365
Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers.
Microsoft ending support for Office 2013
To make sure enterprises get the most out of their Office 365 package, Microsoft announced it will no longer support Office 2013 by the end of February. Instead, the tech giant will push enterprises to upgrade to Office 2016. If your business is still using the 2013 version, here are some things you need to […]
The latest on Microsoft Office for Mac
It’s official. Microsoft has just announced plans to bring support for add-ins to the Mac version of its Office Suite. This marks yet another step forward in Microsoft’s efforts to make the Mac version of the Office Suite more like its Windows counterpart.
Why consider disaster recovery for 2017
The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old […]
How to protect against VoIP call hacking
VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases.
Cyber security and managed services
Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.
Protection from Insider Threats
The human body is amazing—all the various parts working together to live. White blood cells have the responsibility of recognizing and defending the body against foreign invaders. But what if the “invader” is something from within. A recent survey of organizations with 250 or fewer employees revealed that 38% of them had experienced an internal IT security incident in the past year.
- 1
- 2