Multiple monitor setup (6 monitors)
Spent couple hours upgrading the system to add 6 monitors. Built in motherboard had 4 video outputs. Since I needs to add 2 more, I added...
QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack — Krebs on Security
What? Quickbooks got hit too? Don’t you feel helpless when you hear all these big companies and big governments are getting hit with...
Types of Attack Vectors
Cyber-criminals use different types of attack vectors and malware to compromise networks. The five most typical types are viruses,...
DPI-SSL -SonicWall Deep Packet Inspection of SSL/TLS Encrypted Traffic
One of the recent project required to setup DPI-SSL for the network. Customer need to block part of the URL on the link. normally content...
4 Backups
We want to emphasize the importance of having a working backup. Current industry pushes for 3-2-1 backup. A catchy phrase but at...
VoIP Phone System - Hosted vs Premise
First of all, if you do not have VoIP phone system, you should transition out from local carrier to VoIP carrier. one of the best feature...
When was last time you checked the Backup?
Who checks the backup for your company? These days, backup has become an essential component to your day to day business. Have you...