• Ransomware…That’ll be $500, Please!

    By: Keith Deininger, Information Security Analyst, mindSHIFT Technologies on Tuesday, November 3, 2015
    In this overview of the cybercrime malware known as ransomware, IT security expert Keith Deininger provides a history of this criminal activity, and some steps to take to protect yourself and your business. 

  • Moving to the Cloud with AWS - Part 3

    By: mindSHIFT Technologies on Friday, October 16, 2015
    Most organizations choose Amazon Web Services® (AWS®) because it’s cost-effective. Once they’re in AWS, they want to make the most of it, by integrating private clouds with their AWS servers and optimizing their spending. 

    This blog outlines steps you can take to get the most out of your AWS deployment.

  • Moving to the Cloud with AWS - Part 2

    By: mindSHIFT Technologies on Friday, October 16, 2015

    Amazon Web Services® (AWS®) is an attractive option for organizations seeking to expand their IT infrastructure without large capital expenditures. But as with any IT project, moving to AWS requires, at minimum, general IT knowledge. In some cases, it requires a thorough understanding of the AWS structure.

    If you’re considering a move to AWS, this blog outlines a few of the main things to keep in mind.

  • Moving to the Cloud with AWS - Part 1

    By: mindSHIFT Technologies on Friday, October 16, 2015
    The cloud’s attractiveness is well-known: someone else manages the systems, while you manage your applications. Amazon Web Services® (AWS®) is a popular choice and getting started is simple. 

    Before jumping in, a lot of customers have questions. Read this blog to learn about some of the options and strategies for getting the most out of your move to the cloud. 

  • Website Personalization in Three Easy Steps—Getting to Know Your Audience in Sitecore 8

    By: Peter Iuvara, mindSHIFT Technologies on Wednesday, October 14, 2015
    When it comes to delivering marketing messages to your digital audience, there’s nothing more important than making sure it’s relevant and as personalized as possible. Sitecore® has made this complex task much easier with the release of Version 8 and the Sitecore Experience Platform™. 

    Learn more about website personalization with Sitecore in this blog. 

  • The Art and Science of Social Engineering by Cybercriminals

    By: mindSHIFT Technologies on Tuesday, October 6, 2015
    One of the biggest cybercrime trends right now is the use of “social engineering” techniques to get you to give up passwords, personal data or money at home. But—did you know that social engineering cybercrime is happening in business too? 

    It could be happening right under your nose at work. Read this blog to learn what you can do to protect yourself and your company or organization.  

  • Back to School - Know the Online Risks Facing our Children and What to Do

    By: Keith Deininger, Information Security Analyst, mindSHIFT Technologies on Monday, August 31, 2015
    The Internet has a dark side, commonly known as the “Dark Web,” which requires parental and educator vigilance to help ensure the online safety of children. Read this blog for an overview of the steps parents and educators should take to combat the growing online risks.

  • Reduce the Risk of Email Phishing Scams at Your Company

    By: Matt Lunzer, mindSHIFT Technologies on Friday, July 24, 2015
    Phishing emails are malicious attempts to get individuals to divulge private personal or company information. What can you do to protect your company and private data from these phishing scams? Learn about the top actions you should take in this blog. 

  • BYOD Revolution - Winning over the CEO

    By: By Seth, (Fictional) CEO on Tuesday, June 30, 2015

    Hosted desktops can help companies be more productive and empower employees. Read this blog to learn about how one fictional company succeeded with its BYOD strategy.

  • Why Modernizing your IT Matters from an HR Perspective

    By: Sarah, (Fictional) VP of Talent Acquisition & HR on Wednesday, June 3, 2015

    Hosted desktops can help companies be more productive and empower employees. Read this blog to learn about how one fictional company succeeded with its BYOD strategy.

  Showing Page: 1 of 8



Ransomware Cybercrime AWS Amazon Web Services Sitecore CMS content management systems personalization social engineering phishing spear phishing IT Security cyber security cyber safety email security BYOD virtual desktop VDI desktop in the cloud Windows Server 2003 Hosted Exchange Office 365 IT outsourcing outsource IT managed service provider MSP IT services IT support cloud services cloud computing cloud hosting desktop managed services Law firm IT Legal IT LegalTech IT Services for Law Firms SharePoint SharePoint migration SharePoint 2013 SharePoint 2010 SharePoint 2007 professional services infopath disaster recovery business continuity managed services legal IT solutions Small Business IT SMB IT Windows Server 2003 EOL cloud servers WinShock Windows vulnerability disaster planning disaster preparedness hurricane season email backup server backup cloud backup email encryption data encryption data breach HIPAA data security Heartbleed OpenSSL website security Windows XP cloud desktop desktop as a service DaaS software application hosting ISV SaaS Mobile Device Management MDM Bring your own device smartphone security smartphone hacker smartphone malware IT consulting IT strategy VoIP IT Management Services desktop virtualization Education IT Solutions E-rate IT management IT staffing Intranet Office 15 migration Collaboration Business Intelligence Apple® iOS 7® operating system iPhone® 5s iPhone® 5c iPhone® 4g iPhone® 4s iPad® 2 iPad mini iPod® touch hosted cloud services security data center managed IT services IT support healthcare IT ePHI enterprise mobility management tablet security tablet pc security mobile phone security app security smart phone compliance hosted mobile device management SaaS MDM mobile content management MCM cloud mobile device management mobile application management Sitecore CMS Content Management System Telligent social marketing social media communities data backup desktop backup laptop backup IBMi Power Systems iSeries AS/400 System I Power 7+ AIX Maxava iTera Mimix Vision Solutions Sitecore CMS 6.5 Hosted Desktop encryption compliance Document Management Virtualization videos customer testiomonials Green IT cloudshift Protected Health Information regulatory compliance Desktop vitrualization EHR Electronic Health Records