10 Ways DRaaS Can Save Your Bacon

10 Ways DRaaS Can Save Your Bacon by infrascale Names can be so misleading. Take baking soda.  Many of us think of baking soda as only an ingredient used for baking, or maybe something that helps to keep our refrigerators odor-free. But baking soda has many other uses, and is surprisingly good for your health and home, too. The use cases…

Top 10 Cyber Security Tools for Small Businesses

Small businesses have few options for cyber security tools and even fewer resources to deploy and manage them. You must choose wisely to carefully balance low cost, ease of use, and high impact on the security posture of the organization. So what security tools should small businesses focus on? A SANS research paper has 10 suggestions for SMB security tools. The…

5 Reasons Why Voice Technology Evolved from Analog to Software-Based

The ever-changing business landscape has driven voice technology to evolve from the good ol’ analog landlines to powerful digital telephony. Pre-VoIP, analog systems have supported businesses for decades. They’ve been reliable tools for inbound and outbound calls, and can also be used to transfer calls across extension lines. It has well-known functionalities like hold, mute, redial and speed dial, but…

Reason Enterprises Choose SD-WAN as an MPLS Replacement

Enterprises are increasingly deploying software-defined wide area networking (SD-WAN) as a multi-protocol label switching (MPLS) replacement over the WAN. What many initially considered a niche market or even a networking fad is proving to be an advantageous strategy for handling a variety of network challenges. Changes like digital transformation and public cloud adoption are pushing enterprises to consider alternatives to…

SD-WAN Provides MPLS Alternative for Healthcare Organizations in Need of HIPPA Compliance

The stakes are high for data transmissions crossing the network in a healthcare enterprise. Complying with HIPAA regulations while meeting patient expectations for immediate access to medical records is a balancing act, with the added complication of the constant threat of security breach. While multi-protocol label switching (MPLS) is a secure and reliable network pathway, some factors are causing enterprises…

Top 5 Cyber Security Frameworks in Healthcare

HIPAA tries to force healthcare organizations to protect patient data – but does it work? Any health IT professional will tell you, HIPAA compliance alone does not guarantee security. HIPAA is not a complete security framework and it’s not enough to protect ePHI. Many hospitals, doctor’s offices, and others – while striving for HIPAA compliance – also follow one or…

4 Types of Social Engineering Used Every Day

Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when “persuasion” takes a darker turn. In a broad sense, it includes any action that attempts to influence a person to act against their best interests. Technically, acts that influence people…

Chinese Hackers Spread Android Banking Trojan Using Fake Cellphone Tower

According to a Check Point Software blog, Chinese hackers using a rogue cell phone tower, have taken smishing to the next level. The hackers ar distributing Android banking malware via spoofed SMS messages from these rogue cell towers. Security researchers at Check Point discovered that Chinese hackers are using fake base transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android…

How your telephone has evolved over time

By: Chris Stone & Sean Hall 8 MARCH 2017 • 6:00AM In the video above, we look at how the telephone has evolved over time — from tin can phones, to the first-ever mobile device, to the launch of 5G connectivity later this year. From televisions to wearables, gaming to artificial intelligence, this new video series from the Telegraph examines some of the world’s most renowned…

Potential phone scam on those who say ‘yes’

WASHINGTON — Falling victim to a scam, apparently, can be as simple as just saying “yes.”  The Better Business Bureau and several law enforcement agencies are warning of a potential phone scam that involves a caller asking, “Can you hear me?”  As the victim answers “yes,” his or her reply is recorded. That enables the scammer, the BBB said, to use the recorded answer for signing up the victim for a product or service — and then demand payment. Scammers also can use the recorded answer to confirm a purchase agreement if it is ever disputed. Even though some people have reported…