Monthly Archives: October 2014

  • Migrating Your Windows Server 2003: The Targeting Phase

    When migrating your Windows Server 2003 to something more current, you must identify a migration destination for each application and workload. After you’ve gone through the assess phase of the migration process, you should have a catalog of everything that needs to be migrated and its priority in the migration process. Now you must point each application and workflow to its new destination. Continue reading


  • Migrating Your Windows Server 2003: The Discovery Phase

    If you’re still running Windows Server 2003, now is the time to get started on the migration process. Migrating a server takes between 200-300 days to complete, and since the deadline for end of support for Windows Server 2003 is July 2015, delaying the migration process means that your server will be at risk for security threats and malfunctions with no support or backup. Continue reading


  • Enterprise Level 2-Step Authentication Systems

    Securing your organization's sensitive data is a vital part of information policy for any entity, no matter how large or how small. Passwords are not what they used to be—in fact, they were never all that secure in the first place. Even with strong password practices, the bitter truth is that anyone who styles themselves a hacker can download a password cracking tool and break a "strong" eight-character password in a matter of minutes. Without additional measures, your security is about as watertight as a laundry basket. Continue reading


  • Take Your Digital Security to the Next Level

    While the big data breaches are the ones that make the news, data protection is also personal protection. Your life can be turned upside down with one simple breach that allows malware, spyware, and viruses into your computer to wreak havoc. Your photos, your finances, and even your social media presence can be targets for malicious hackers either out for fast money or just the thrill of doing harm. Take steps right now to reduce your risk and keep your peace of mind. Continue reading


  • 10 Things Every Business Must Do to Secure Its Digital Assets

    It's a wild, wild web out there, and we're learning just how wild it can be every day with news of data security breaches from places where we should feel secure, like partners in Apple Pay, Apple’s new payment technology, Google’s Gmail, and more. However, data security is a practice that everyday users who should know better fall by the wayside. Whether you’re using a smartphone, tablet, laptop, or desktop, on a public Wi-Fi network or at the office on a “secure” connection, security practices need to be concrete policy in order to work. The FCC advises that a business pay attention to 10 different areas to ensure its digital assets are well covered. Continue reading