dcsimg

Why Would Anyone Use Facebook’s Digital Currency?

Facebook is determined to launch their own digital currency called Libra, but why would anyone trust them at this point? … [Read more...]

Bluetooth Security Problems: A Cause For Concern

Bluetooth security… Some consider it an oxymoron, like ‘global intelligence’ community or ‘offshore support’ while others recognize Bluetooth flaws and understand their causes. Whatever side of the fence your opinions lie, it’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data. … [Read more...]

Double Encryption: Is It More Secure Or Dangerous?

Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case. … [Read more...]

How to Use Slack to Keep Your Team on Track

Over the past few years, Slack has risen to be the largest collaboration tool to help teams stay on track. In this article, I will discuss how it works and some concerns about the tool. … [Read more...]

Should Companies Be Concerned About Huawei Tech?

Should businesses be worried about Huawei tech on their networks or is this really just hysteria and a political agenda that is sending shockwaves across the IT landscape? Let's discuss. … [Read more...]

Is Big Data Losing its Appeal in the Face of Data Privacy Concerns?

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy. … [Read more...]

Is PSD2 Good for Banks And How Should IT Teams Implement It?

The EU’s PSD2 directive (a revised payment service directive) aims to regulate electronic payments in EU member countries. It has no impact on traditional paper-based transactions. … [Read more...]

Using Managed File Transfer (MFT) To Harden Data Security

How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached? … [Read more...]

8 Reasons To Automate Your File Transfers

We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked. … [Read more...]

How to Easily Monitor Bandwidth Usage Per Device

Below is an excerpt from our WhatsUp Gold Network monitoring blog, in which we describe what bandwidth is, and how you can easily monitor bandwidth by usage, device, IP address, and more.  … [Read more...]