Link to post: <?php the_title(); ?>

BlueCore’s Answer to WannaCry

A major ransomware attack was noticed yesterday and has affected companies across the globe. Named WannaCry, this is a very serious threat to cybersecurity. CNN talks about it here. While WannaCry was detected by many firewall and security providers weeks ago, the threat escalated recently with invasions into many large public companies and private organizations

Read more »
Link to post: <?php the_title(); ?>

Why Webroot

Webroot offers some of our favorite network security products, and there are a lot of reasons why we think their products and services are top-notch. First and foremost, though, is that Webroot offers quality, cloud-based, real-time internet threat detection, protecting your network from infections and data theft without sacrificing network performance. After that, though, there

Read more »
Link to post: <?php the_title(); ?>

Skype: Not Just for Viral Videos

Everyone has been cracking up at a recent clip from BBC. Professor Robert Kelly was being interviewed via Skype when his young children made their way into his home office for a few seconds before being accosted ninja-style by their mom. If you haven’t seen the clip, you’ve got to see it here. While most

Read more »
Link to post: <?php the_title(); ?>

Best Practice: Network Closets

Small businesses often come with small space. At our BlueCore office, we can relate! But one thing we commit to – and encourage all our partners to consider – is a dedicated network closet for any onsite servers and network equipment. It’s really not as complicated as you might think. A network closet is simply

Read more »
Link to post: <?php the_title(); ?>

Avoiding the phishing hole

Phishing, the term for fake emails designed to corrupt files or steal valuable information, is on the rise, more than doubling since 2010. Phishing cost organizations about $4.5 billion each year. Yes, that’s billion with a B. Let’s make sure your company doesn’t contribute to that figure by considering how to first prohibit such emails

Read more »