Blog

Order management systems and eCommerce

If business value is all about the long-term health and well-being of your company, there are few things more important than getting your product into customers’ hands swiftly and efficiently. Thankfully, modern technology has revolutionized these tasks and how you add value to your business.

Beware of the Cloudbleed bug

Cloudflare, an internet security services company, found a major bug in its software that leaked sensitive data like cookies and passwords from client websites. Although investigation into the security flaw, also known as Cloudbleed, is still underway, early reports found that malicious hackers have not exploited this vulnerability.

A beginner’s guide to Snapchat for business

The 21st century is the age of social media, with a plethora of outlets available, users are spoilt for choice. Business owners are faced with the same dilemma, between Facebook, Instagram, Twitter, and about thirty more – which one should they invest in? It’s important that the platform is simple, interactive, and touches base with […]

Are SDN & network virtualization the same?

Nobody’s perfect, even IT technicians. We’ve seen plenty of people interpret software-defined networking and network virtualization as the same exact service, but it’s time we clear up the difference. It’s small, but it could be the difference between major cost savings and a small increase in functionality.

WebRTC vs VoIP: competing or complementary?

Although some critics are labeling the newest tool in the internet-based telecommunications field a “VoIP killer,” nothing could be further from the truth. The reality of the situation is that this new technology, WebRTC, is here to make it even easier for customers to contact your business using the internet.

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it.

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of […]