
NSA-approved: mobile virtualization
Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate

Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see

Bluetooth technology helps simplify our daily lives — it allows for hands free communication, a quick and easy way to share content with friends, family,

Like it or not, the world’s biodiversity is diminishing. Fortunately, zoos are playing a greater role in preventing the extinction of species in nature—in effect,

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign

macOS version of HandBrake, an open-source video transcoding software that converts multimedia files into various formats, was recently infected with a Trojan. According to HandBreak’s

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes,

Would you be upset if someone unintended read your mail? What if the letter contained sensitive information? Now consider email. If you’re like many people

From the desk of: Cathy Coloff As we wrap up our zoo newsletter theme, I’ve done more reading than I usually do on our environment,

It’s a Zoo Out There!
In this issue:
Have a question about any of our blog posts or another IT topic? We’re always happy to help. Reach out using the form below and a friendly IT Radix team member will be in touch.
"*" indicates required fields
"*" indicates required fields