With your small business starting, or growing to a point you need better email alternatives than Yahoo or Hotmail, where can you turn? There are plenty of avenues to go down; buy a server and host all your functionality at your office; go with a virtual server and run everything on it; move to the cloud and run services on there that you need. However, if the answer is to move to the "cloud" for your business, is Office 365 from Microsoft or Google Apps better for you? The review link below, I believe, gives both a fair shake, and ultimately it is dependent on your needs for cost, overhead, and ease of use for both IT and for end users.
Monthly Archives: June 2011
Its 5 AM, do you know where your old data is?
A scathing report emerged today, accusing Staples of reselling old customer machines that still had sensitive customer information on it. Over 1/3rd of systems independently checked still had data that included social security numbers, tax records, and banking information. 17 out of 20 laptops that were wiped still had information on them that would be labelled sensitive on them.
Critical Internet Explorer exploit – Update NOW!
Three days after patching 3 known vulnerabilities in Internet Explorer, a vulnerability in Internet Explorer 8 has already been exploited. Microsoft and security professionals agree that if you have not run the latest round of updates for your systems running Internet Explorer 6, 7, or 8, do so now or upgrade to Internet Explorer 9 immediately. The exploit in question abuses a hole found in IE that simply by browsing to a compromised site, automatically downloads malicious software to a user's local machine. This software then connects to a remote server to await instructions on how to exploit the user's system.
Spear Phishing on the increase
A way to get users to install crimeware on their computers, hackers are using spear phishing tactics to commit illegal acts on the internet. Spear phishing is targeting individuals inside companies as opposed to regular phishing that sends thousands of emails out in a scatter shot method. People respond better to an email from a "friend" that emails them by name to download an 'important' piece of software that, when done, allows the phisher to control that machine. Malware, once installed, can be used to gather passwords, steal company information, and even be used to commit attacks against other targeted systems on the same network or on the internet.