SharePoint
  • How to Protect Yourself from Unsecure Wi-Fi

    By: Keith Deininger, CISSP, CISA, Sr. Security Analyst, mindSHIFT Technologies on Monday, February 1, 2016
    How much of a security risk do you take when you use public Wi-Fi connections? 

    In short, you should never trust any public Wi-Fi network to be completely safe. Not the Wi-Fi at your local coffee shop, airport or even the free Wi-Fi that is provided by a hotel for its guests. 

    This blog outlines the steps you need to take to protect your devices and data from malware and cybercriminals who are out to steal your data via compromised Wi-Fi systems. 


  • More of the Same Cybersecurity Issues in 2016—Much More

    By: Keith Deininger, CISSP, CISA, Sr. Security Analyst, mindSHIFT Technologies on Monday, January 4, 2016

    Cybercriminals are not slowing down their attacks on corporate networks and your data. It will only increase in 2016. 

    Read this blog for a guide to IT security decision making in 2016 and beyond.


  • Pick the Cloud that is Right for You

    By: mindSHIFT Technologies on Wednesday, December 16, 2015
    You can have your IT systems spread over public, private and hybrid clouds simultaneously. The cloud gives you flexibility to locate and operate your systems in the manner that is most advantageous to your business. 

    Read this blog for an introduction to the top operations and business benefits of the hybrid cloud. 



  • 10 Best Practices for High Performance Classroom Networks

    By: John Stewart, mindSHIFT Technologies on Wednesday, December 9, 2015
    With the ever increasing use of digital technology in the classroom, it’s critical for education leaders to have a plan to address the requirements of today and the future. 

    This blog outlines the strategic, tactical and planning considerations for improving the network infrastructure in your classrooms. 



  • Protecting Critical Network Infrastructure from Threats

    By: Keith Deininger, CISSP, CISA – mindSHIFT Technologies on Wednesday, December 2, 2015
    Maybe you didn’t know it, but your organization’s data, networks and systems are constantly under attack. As soon as you connect your computers to the Internet, cyber-criminals are using sophisticated methods to infiltrate your software and install malware, spyware, ransomware and other similar attack programs collectively known as APTs (advanced persistent threats).  

    Read this blog to learn about the key steps needed to protect your data and network. 



  • Ransomware…That’ll be $500, Please!

    By: Keith Deininger, Information Security Analyst, mindSHIFT Technologies on Tuesday, November 3, 2015
    In this overview of the cybercrime malware known as ransomware, IT security expert Keith Deininger provides a history of this criminal activity, and some steps to take to protect yourself and your business. 


  • Moving to the Cloud with AWS - Part 3

    By: mindSHIFT Technologies on Friday, October 16, 2015
    Most organizations choose Amazon Web Services® (AWS®) because it’s cost-effective. Once they’re in AWS, they want to make the most of it, by integrating private clouds with their AWS servers and optimizing their spending. 

    This blog outlines steps you can take to get the most out of your AWS deployment.



  • Moving to the Cloud with AWS - Part 2

    By: mindSHIFT Technologies on Friday, October 16, 2015

    Amazon Web Services® (AWS®) is an attractive option for organizations seeking to expand their IT infrastructure without large capital expenditures. But as with any IT project, moving to AWS requires, at minimum, general IT knowledge. In some cases, it requires a thorough understanding of the AWS structure.

    If you’re considering a move to AWS, this blog outlines a few of the main things to keep in mind.



  • Moving to the Cloud with AWS - Part 1

    By: mindSHIFT Technologies on Friday, October 16, 2015
    The cloud’s attractiveness is well-known: someone else manages the systems, while you manage your applications. Amazon Web Services® (AWS®) is a popular choice and getting started is simple. 

    Before jumping in, a lot of customers have questions. Read this blog to learn about some of the options and strategies for getting the most out of your move to the cloud. 



  • Website Personalization in Three Easy Steps—Getting to Know Your Audience in Sitecore 8

    By: Peter Iuvara, mindSHIFT Technologies on Wednesday, October 14, 2015
    When it comes to delivering marketing messages to your digital audience, there’s nothing more important than making sure it’s relevant and as personalized as possible. Sitecore® has made this complex task much easier with the release of Version 8 and the Sitecore Experience Platform™. 

    Learn more about website personalization with Sitecore in this blog. 

  Showing Page: 1 of 9
    

Archives

Tagcloud

Cybersecurity Wi-Fi IT security data security phishing ransomware managed service provider MSP Hybrid cloud public cloud private cloud Charter Schools classroom network e-Rate PARCC Measures of Academic Progress Cybercrime spyware advanced persistent threats APTs AWS Amazon Web Services Sitecore CMS content management systems personalization social engineering spear phishing cyber security cyber safety email security BYOD virtual desktop VDI desktop in the cloud Windows Server 2003 Hosted Exchange Office 365 IT outsourcing outsource IT IT services IT support cloud services cloud computing cloud hosting desktop managed services Law firm IT Legal IT LegalTech IT Services for Law Firms SharePoint SharePoint migration SharePoint 2013 SharePoint 2010 SharePoint 2007 professional services infopath disaster recovery business continuity managed services legal IT solutions Small Business IT SMB IT Windows Server 2003 EOL cloud servers WinShock Windows vulnerability disaster planning disaster preparedness hurricane season email backup server backup cloud backup email encryption data encryption data breach HIPAA Heartbleed OpenSSL website security Windows XP cloud desktop desktop as a service DaaS software application hosting ISV SaaS Mobile Device Management MDM Bring your own device smartphone security smartphone hacker smartphone malware IT consulting IT strategy VoIP IT Management Services desktop virtualization Education IT Solutions IT management IT staffing Intranet Office 15 migration Collaboration Business Intelligence Apple® iOS 7® operating system iPhone® 5s iPhone® 5c iPhone® 4g iPhone® 4s iPad® 2 iPad mini iPod® touch hosted cloud services security data center managed IT services IT support healthcare IT ePHI enterprise mobility management tablet security tablet pc security mobile phone security app security smart phone compliance hosted mobile device management SaaS MDM mobile content management MCM cloud mobile device management mobile application management Sitecore CMS Content Management System Telligent social marketing social media communities data backup desktop backup laptop backup IBMi Power Systems iSeries AS/400 System I Power 7+ AIX Maxava iTera Mimix Vision Solutions Sitecore CMS 6.5 Hosted Desktop encryption compliance Document Management Virtualization videos customer testiomonials Green IT cloudshift Protected Health Information regulatory compliance Desktop vitrualization EHR Electronic Health Records