CIO Perspective: How to Form Strong End-user Relationships
As I have discussed in my previous articles, the days of the “dictating IT” is long over. We are in an era where the end users are involved and influence…
CIO Perspective: How to Form Strong End-user Relationships
As I have discussed in my previous articles, the days of the “dictating IT” is long over. We are in an era where the end users are involved and influence…
Can Your Domains Get Hijacked?
Imagine this scenario: your customer service line gets a call from the owner of a small business whose e-commerce website is hosted through your service. The owner is in a…
Are Your Employees the Biggest Threat to Your Cybersecurity?
Rather than concerning themselves with malicious hacker groups like Lizard Squad, business owners may want to learn from federal agencies and look at their insiders and employees as the next…
CIO Perspective: Don’t Overlook Those Risks
The bulk of CIOs time is spent working on data breaches, security issues, disaster recovery, business continuity and justifying technology investments. However, there are some issues that may not seem…
Why Entire Web Hosts Can Be Destroyed by Cyber Attacks
It seems like more and more prominent web servers are getting hacked and attacked these days. If even the giants of online industry are susceptible to hacks and attacks, what…
The Great Hacking Heist of 2014
2014 seemed to be the year of the hack and whittling away at website capabilities. While some hacks can serve as a mere annoyance to web hosts and their clients,…
What Will Be the Biggest Hosting Trends for 2015?
It has been over a century since Charles H. Duell, the Commissioner of the US patent office in 1899 declared that “everything that can be invented has been invented.” The…
President Obama’s Cybersecurity Speech – What Can We Expect?
As part of his series of State of the Union Address previews, President Barack Obama recently spoke at the National Cybersecurity and Communications Integration Center. He announced his intention to…
CxO Perspective: Here Is How You Are Putting Your Company At Risk
A CIO has to succeed in many areas; from technology to financials, from people to service levels, a CIO has to keep an eye on all the issues. However there…
New Cloud Revenue Streams for 2015
As more and more businesses start to use shared services to outsource their IT operations, it is becoming more evident how beneficial these services truly are. The ever-changing demands and…
The Recent Cyber War: Who Won, Who Lost, and What Lessons Did We Learn?
The impact of inexpensive IT networking systems has made cyberwarfare capabilities relatively cheap initiatives compared to pursuing nuclear weapons. For instance, North Korean hackers are chosen from universities and begin…
How to Deal with a Tumbling Project
You or your department may have an incredible project history with stellar achievements. However this does not mean that every project will succeed. Sometimes things simply do not work. Here…