GDPR and Google Analytics

In case you don’t know about GDPR, it stands for General Data Protection Recognition. The European Union issued new standards about information sharing, which has resulted in a flurry of notifications about updated privacy policies. (Someone even joked recently about...

Cluster Shared Scramble

Hyper-V Clustered Shared Volumes are great…. except when the mount points get scrambled.   How does that happen you ask?   It happens like this. You have a problem on your storage network that prevents your Hyper-V servers from communicating with the Cluster Shared...

What the FBI vs. Apple Debate is All About

As an I.T. consultant, I am asked often for my opinion on the battle between the FBI and Apple over gaining access to data on an iPhone that was used by one of the San Bernardino terrorists. I usually start my response with “Well, it’s complicated…” which is a typical...

Defeating Cryptolocker

Last year was a busy one on the IT security front. Between Heartbleed, Shellshock, Poodle, botnets, and keyloggers, I’m sure that everyone in the IT field has been kept on their toes. Keeping malware off your network has always been a big challenge yet the most...

“Shellshock” Bash Bug Security Recommendations

By now you may have heard about the latest internet security threat known as “Bash Bug” or “Shellshock.” This threat, if exploited, can allow an attacker to control and send commands to a vulnerable device. We have been tracking this threat since it became public last...

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!