Blog

New security flaw in popular image uploader

New security flaw in popular image uploader

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely.

Get more retweets with these Twitter tactics

Get more retweets with these Twitter tactics

Are your tweets not getting enough exposure? With so many other social media campaigns out there, it can be tricky to get the attention of followers in Twitter. While posting regularly and writing bold headlines are important in grabbing the audience’s attention, there are other Twitter tactics that you should be employing in order to get the most retweets.

Essential Server Management: Cooling

Essential Server Management: Cooling

Servers are the heart of most modern SMBs. They host intranetwork data, customer data, and facilitate product delivery. Like any piece of equipment in your workflow, servers need to be carefully cared for in order to keep you up and running. With the strain that most businesses put on their servers, one of the most important maintenance variables is temperature management.

The basics of app virtualization

The basics of app virtualization

App virtualization is a term that gets thrown around by professionals quite often. Vendors say it’s a necessity for small business owners. But for a service that claims to make your life easier, it’s ironic that small business owners are left even more confused with what app virtualization actually is.

The age-old marketing tool you’ve forgotten

The age-old marketing tool you’ve forgotten

From free information products such as ebooks to brochures and email campaigns, today’s marketers have a wealth of tools and tactics at their disposal. While content marketing and social media garner most of the attention in the marketing world, it’s easy to forget about tried and true techniques that are as effective today as they were twenty years ago.

Different types of hackers defined

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of what resources need the most protection in your business.

Ransomware alert for healthcare practices

Ransomware alert for healthcare practices

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.