Control Your Data!
Control Your Data! Student Gets Creative with Data Accidentally Blasted out by University When it comes to information security, Cal Poly Pomona (CPP) looks set to get a ‘could try harder’ on its report card this year. The polytechnic university, based in Pomona, California, inadvertently emailed personal information on all of its College of Science […]
The Cloud and Virtualization Explained
The Cloud and Virtualization Explained Cloud computing and virtualization are similar but that doesn’t mean that one can be substituted for the other. Each has its own benefits, so it pays to know how both work, so you can take advantage of them. Virtualization Imagine a company with five servers, each assigned a single task […]
Why an Uninterruptible Power Supply is Important in Network Gear
Why an Uninterruptible Power Supply is Important in Network Gear Why an Un-interruptible Power Supply is Important in Network Gear January 11th, 2019 Ashton Technology Solutions Storms, floods, fire, and other emergencies can cause productivity loss due to power failure. Utilizing an uninterruptible power supply (UPS) for your workstations will ensure that you never lose […]
Ohio’s New Data Security Law
Ohio’s New Data Security Law Ohio’s New Data Security Law Seeks to Minimize the Risk of Data Breaches Impacting Insurers and Their Customers Stu Sjouwerman, KnowB4 Following in the footsteps of North Carolina, the new Ohio law looks to regulate the cybersecurity practices, reporting, and notifications of its insurance industry. Modeled after the NAIC […]
The Latest & Greatest Office 365 Updates
The Latest & Greatest Office 365 Updates Office 365 just keeps getting better and better. Check out how these new and upcoming enhancements can improve productivity. Office Write and draw with digital ink – Typing is easy on desktops and laptops, but when you’re on touch-enabled devices, keyboards are cumbersome to use, whether they are […]
Your Password may be Poor – Update it Now!
Your Password may be Poor – Update it Now! For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols (in theory, that’s actually four things). And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? […]
The End is Near. Windows 7 End of Life is Approaching.
The End is Near. Windows 7 End of Life is Approaching. An Outdated Operating System Poses a Huge Security Risk It’s Time to Abandon Windows 7 for a Safer Option. Windows 7 is considered to be one of Microsoft’s most successful operating systems. So much so that many organizations skipped upgrading to either of Microsoft’s […]
Why the Internet of Things is Here to Stay
Why the Internet of Things is Here to Stay There are a lot of connected devices nowadays, but not all of them have a very practical purpose. Some of the more practical uses of connected technology range from security systems to thermostats, but other technologies can’t necessarily be justified so easily. Why would a blender […]
Understanding 5G Helps Highlight its Benefits
Understanding 5G Helps Highlight its Benefits You’ve heard of 3G and 4G technology for your mobile devices, but have you ever stopped to consider what these phrases actually mean? Since the world is on the cusp of a 5G introduction, it’s time to take a look at what these wireless technologies do, and how 5G […]
3 Business Communication Standbys
3 Business Communication Standbys Communication is one of the most important parts of running a business, and if you’re not communicating properly, it could spell trouble for your organization. Projects could be delayed and could ultimately cost your organization more money than they’re worth. Thankfully, technology makes communication better, easier, and more efficient. Here are […]