Back in the early days when viruses started appearing they were focused on vandalizing (just to cause trouble). The goal of these viruses were to delete files, reformat the hard drive and or just cause headaches to the end user. However, in recent years (2013) viruses have been used to collect money via ransom
Marc Haskelson joins SMB Nation to chat about the affects Covid is having on the economy. After speaking with many clients and or prospects Marc learned many people are asking where they should invest time and effort with the recession we are currently seeing and/or the future recession we are going to see with
Being prepared means being equipped with the proper supplies you may need in the event of an emergency or disaster. It’s important for every individual, family and business to have a plan set in place in the event of a disaster. With each different type of disaster come specific things you will want to do.
By Gary Audin
Digital transformation can affect network security architectures that employ the enterprise data center for connectivity. Businesses have more users, devices, applications, services, and data located in cloud services outside the businesses
Larry Doyle chats with SMB Nation about Microsoft Virtual Desktops and what he is learning and deploying. Over the last few months Larry has done quite a bit of research and training on Microsoft Virtual Desktops and how you manage the user experience (user profile and applications).
Michael Fraser joins us to chat about the current economic state and new needs for businesses long term. The current state of MSP IT is going from rack and stack infrastructure to API infrastructure or IT as code. MSPs need to start learning and implementing this new infrastructure into their clients and stop relying
Ransomware is something that has been talked about for quite awhile and has been one of the biggest issues in terms of IT security in the last two years. Although, many people think that Ransomware is a one shot deal, in reality it is a
By Gary Audin
Who manages your resources? What access do they have? How many have privileged access? It expands when you add IoT devices.
Super user accounts, those with privileged access have been poorly governed. Identity management software (IAM) may leave super user accounts uncontrolled while allowing advanced access privileges on the network.
I’ve used the pandemic shutdown this Spring and Summer to pen my 23rd book. Heck – what else was I going to do? And I did it on the featherweight LG Gram with its 17” monitor. My experience was that the LG Gram exceeded my expectation on so many levels.
Harry is joined by Kevin Hunter, Carey Holzman, and Tom Benkert to discuss how to start a profitable YouTube channel. They explore the steps to starting your channel as well as some great tips and tricks to building your audience (you must know your
We go down under with Michael Jenkins to explore the resurgence of Ransomware. With many businesses ramping up and sending employees home to work we are seeing an uptick in ransomware. Many businesses were not prepared to have