Entries by ktrang

Microsoft networking protocol at the core of recent global malware attacks

The company is going to kill off SMB1 at long last, but you shouldn’t wait to disable it Another day, another global malware attack made possible by a Microsoft security hole. Once again, attackers used hacking tools developed by the U.S. National Security Agency (NSA), which were stolen and subsequently released by a group called […]

Ransomware Attack: Goldeneye

  In the wake of another ransomware attack, this one labeled Goldeneye, we’re reaching out to ensure our partners that we’re focused on security first. According to Forbes, there are similarities with WannaCryptor, but experts are labeling this a variant of Petya aimed at the file system—specifically targeting the master boot record—instead of encrypting individual […]

Benefits of choosing Private Hosting Services

Looking to make the move into the cloud can be a bit of daunting process, with so many options available. One of the first decisions to make is choosing whether you want to opt for a public provider or choose a Private Hosting Services solution like Knownhost that offers servers with amd ryzen. With decades […]

Web Security : Is Your Chat Client Leaving You Exposed?

Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cyber criminals to create command-and-control (C&C) communications infrastructures for their malware campaigns. As corporate web security teams become more aware of traditional malware threats and deploy new security solutions to defend […]

VMware vCenter Converter : Tips and Best Practices

Vmware vCenter converter can convert Windows and Linux based physical machine and Microsoft hyper-v systems into Vmware virtual machines. Here are some tips and suggested best practices Tasks to perform before conversion : Make sure you know the local Administrator password! If the computer account gets locked out of the domain – you are likely […]

Windows Server 2016 docs are now on docs.microsoft.com

Microsoft have recently announced that their IT pro technical documentation for Windows Server 2016 and Windows 10 and Windows 10 Mobile is now available at docs.microsoft.com. Why move to docs.microsoft.com? Well here microsoft promise: “a crisp new responsive design that looks fantastic on your phone, tablet, and PC. But, more importantly, you’ll see new ways […]

5 Trends in Enterprise Cloud Services

Even though the future of IT belongs to the cloud, much of the enterprise world is still clinging to legacy systems. In fact, 90 percent of workloads today are completed outside of the public cloud. With this continued resistance to cloud services adoption at the enterprise level, today’s “cloud evangelists” are playing a more important […]

Understanding Cyberattacks from WannaCrypt

Cyberattacks are growing more sophisticated, and more common, with every passing day. They present a continuous risk to the security of necessary data, and create an added layer of complication for technology solution providers and in-house IT departments trying to keep their clients’ systems safe and functional. Despite industry efforts and innovations, the world was […]

Choose the best server RAM configuration

Watch your machine memory configurations – always be care to implement the best server RAM configuration! You can’t just throw RAM at a physical server and expect it to work the best it possibly can. Depending on your DIMM configuration, you might unwittingly slow down your memory speed, which will ultimately slow down your application servers. […]

Healthcare industry embraces Cisco Umbrella

Why are Healthcare organizations across the country using Cisco Umbrella? Healthcare IT professionals need to overcome a mounting list of security challenges: unmanaged consumer endpoints, ever-changing regulatory landscape, uptick in smart medical devices and an increased use of Wi-Fi networks in hospitals and healthcare facilities. Cloud-delivered security provides faster deployment with an open, automated way […]