Common Anti-Spam Filtering Techniques

Email spam has been a problem for almost twenty years and continues to plague us today. This problem would be far worse if we didn’t have anti-spam software. Two common filtering techniques for blocking email spam will be discussed below: List Filters The simplest anti-spam technique makes use of lists to either allow email into or block […]

Choosing An Email Spam Filter

If you have an email inbox, it’s critical you use a spam filter to sift through the countless junk emails you get each day. Spam mail is not only time consuming. It can also bring in malware, phishing software and viruses. Spam filters are software used to scan emails to determine whether of not they’re spam. Before […]

Business Continuity: The Value of Three “P”s

Cloud computing is changing the computer industry very quickly. Business is the chief recipient of this new concept. It saves money and time while protecting data and ensuring business continuity in spite of breaches and disasters. Planning for Disaster This attitude was a fatalistic approach to the workday just a few years ago. However, in the current […]

Business Continuity Requires Disaster Recovery Planning

Many companies don’t recognize that unprotected software and data can be a significant threat to their future. Data backup protects not just a company’s proprietary information, but also that of its vendors, partners and customers. A Disaster  Recovery Plan will help maintain business continuity in the face of an attack, and help them recover faster […]

Business Continuity: 3 Things to Consider

Business continuity isn’t necessarily something you think about every day, but it’s actually very important. In fact, your company’s ability to maintain continuity during an emergency could be the deciding factor in the success or failure of your business. Here are three things you should consider when it comes to preparing and maintaining continuity. Preparedness The […]

Brute Force Hacking: Are Your Servers Safe?

Hollywood often portrays the hacker as an individual who is highly adept at guessing usernames and passwords. In the real world, servers actually do get hacked in this way. However, the guessing isn’t done by a person but rather by software. The software sometimes does this systematically by using all possible combinations of characters to guess usernames […]

Assuring Business Continuity With Offsite Data Centers

Your business is your life. And business continuity is what makes your life work. All the wires and lights, servers and data centers in the world can’t help you if you can’t use them to serve your customers. That’s where offsite data centers and secure, redundant networks come in. Hosting your data offsite ensure that if anything […]

3 Things that Will Stop Your Business in Its Tracks

If you own or run a business, you understand how important it is to keep your business running all the time. As little as a day or two, or even a few hours of down time can ruin a good profits streak, and the effects can be seen for months, sometimes years. Unfortunately, as helpful as technology […]