Types of Attack Vectors
Cyber-criminals use different types of attack vectors and malware to compromise networks. The five most typical types are viruses,...
DPI-SSL -SonicWall Deep Packet Inspection of SSL/TLS Encrypted Traffic
One of the recent project required to setup DPI-SSL for the network. Customer need to block part of the URL on the link. normally content...
4 Backups
We want to emphasize the importance of having a working backup. Current industry pushes for 3-2-1 backup. A catchy phrase but at...
Server 2016 and 8 workstation ordered and Setup in 3 days.
I like to share the timeline and the work process with one of our recent project. About 6 months ago, a customer wanted to have a secure...
VoIP Phone System - Hosted vs Premise
First of all, if you do not have VoIP phone system, you should transition out from local carrier to VoIP carrier. one of the best feature...
When was last time you checked the Backup?
Who checks the backup for your company? These days, backup has become an essential component to your day to day business. Have you...