Purplo

7 Quick Tips to Help You Maximize Employee Productivity

There are only so many hours in a day, and figuring out how to get the most out of each one is a trick we all wish we could master. Or perhaps more importantly, it’s a trick you wish your employees could master. Getting them on the right track is easier than you might expect. […]

10 Best New Features in Windows Server 2016

Windows Server 2016 is now available for general use. Its release coincides with contemporary information technology trends concerning containerization and hybrid connectivity related to cloud services. The list of new features in Windows Server 2016 is staggering, but 10 of its features in particular stand out, as listed below. Containers (Image credit: Microsoft) Microsoft has […]

Protecting Your Firm From a Cyber Attack

Law firms have become an increasingly popular target for cybercriminals. As most client data is now collected and stored in a digital format, firms have had to step up their cyber security measures accordingly. Despite this heightened vigilance, many law firms are still convinced that they are either too small, or too unknown to catch […]

Will Your Business Continuity Plan Come Through if Disaster Strikes?

Whatever industry your enterprise is part of, having a viable business continuity (BC) and disaster recovery (DR) plan in place is paramount to doing business in this day and age. Disasters can befall any business entity at any time, and often cause significant loss of some kind – either financial or through data loss or […]

How Often Do You Really Need To Replace Your Hardware?

There has been a lot of debate as to what your hardware refresh cycle should look like. The answer tends to fall somewhere in the 2 – 4 year range, with recommendations from hardware manufacturers leaning more towards a shorter cycle. But there is no one right answer to this question. There are actually a […]

Hackers Can Spy and Take Screenshots with New Mac Virus

A recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab confidential data from computers, is codenamed “Mokes”. Discovered in January of this year by Stefan Orloff of Kaspersky Labs, Mokes was revealed to be a quite sophisticated cross-platform malware strain which also works on Linux and […]

Yahoo Data Theft –A Good Reason to Regularly Change Passwords

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]

Is Your IT in the Cloud?

Understanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as businesses of all sizes face the ongoing threat of cybersecurity attacks. Many businesses are now utilizing the cloud as an indispensable option for providing the necessary backup required in an […]

Email Phishing Schemes to Suffer with DMARC Authentication

Email phishing schemes have a powerful new enemy on their hands in DMARC, or Domain-based Message Authentication, Reporting & Conformance. It will also be an enemy to email marketers – even the white hat ones – because it will filter out any email message that cannot be verified as being sent from an owned domain. […]

10 Ways to Make the Most of Your Office 365 Migration

There are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of benefitting from moving to the cloud-based service of Office 365, but were you aware that you won’t just be enjoying the improved security, convenience and consolidation of […]