One of the more difficult situations a business can face is a disaster that disrupts the continuity of operations. Specifically, a disaster that impacts your IT infrastructure in such a way that a return to normal operation is a monumental task. Incidents like this include floods, fires, power surges, and viruses. The biggest problem with…Details
The number of security threats to your IT infrastructure increases every day. These threats come in several varieties, including spyware and denial of service attacks. From email to firewalls, all systems need to be secure in order for your systems to run efficiently. Maintaining constant security is an everyday struggle, but having strict controls and…Details
Microsoft Office is the de facto standard when looking at any office productivity software solution. Word, Excel, PowerPoint, Outlook, and Access are used by professionals in every industry. These Microsoft Office programs have been steadily developed and improved for 30+ years. There are two options when purchasing Microsoft Office solutions – subscription-based Office 365 or…Details
Ransomware is malware designed to hold data hostage on a device and then demand a ransom to decrypt or recover files. Ransomware can occur in multiple forms – some can be easily reversed by an experienced IT professional to those that encrypt files without prospect of recovery. Most variations, when installed, will display a message…Details
Cyber security is an undeniably hot topic for every organization – no one is immune. The ever-increasing amounts of data, servicing customers through various technologies, and employing users who work with multiple devices and in alternate capacities keeps security staff abuzz with concern. A simple security breach can very quickly cripple business operations. Being vigilant…Details
Support for Office 2003 ends April 8, 2014
Microsoft will end support for Office 2003 on April 8, 2014. This change will affect your software updates and security options.
Learn what this means for you and how to stay protected.
Microsoft security advisory: Vulnerability in Microsoft Word could allow remote code execution:
Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information.
To view the security advisory, go to the following Microsoft website: