Blog

What you need to know about Cloudbleed

What you need to know about Cloudbleed

Internet security company Cloudflare revealed a major flaw in their system. The so-called ‘Cloudbleed’ vulnerability leaked customer information from thousands of websites, according to Cloudflare researchers. Fortunately, there have been no signs of exploitation, but that doesn’t mean you should be complacent.

Is WebRTC a worthwhile addition for you?

Is WebRTC a worthwhile addition for you?

The VoIP industry is becoming increasingly hard to define. More and more are voice communications being made over internet connections, and sometimes you may not even realize you’re doing it. WebRTC is a newcomer to the internet-based telephony field.

Which Office 365 model is right for you?

Which Office 365 model is right for you?

From Word to SharePoint, Office 365 has a lot offer. But each business requires different features from Office 365. Some may prioritize business analytics, while others may be content with no more than the productivity suite and Outlook. If you’re planning to deploy Office 365, first consider your business needs, then use the information below to find out which license is right for you.

Is fileless malware a threat to you?

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger.

Advice from a failed disaster recovery audit

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

3 Virtualization issues to watch out for

3 Virtualization issues to watch out for

Although data storage is only one of the many ways to benefit from virtualized hardware, it’s still the most common use of the technology. Despite this popularity, virtualized storage is susceptible to a number of mismanagement catastrophes. We’ve outlined the three most common mistakes when utilizing this technology, right here.

Are your printers safe?

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise.

The right social media platforms for SMBs

The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization.

Bulletproof IT Recognised for Excellence in Managed IT Services

Bulletproof IT Recognised for Excellence in Managed IT Services

Calgary , Alberta, February 18, 2017 – Bulletproof IT, Alberta’s leading managed services provider, has been named one of the Pioneer 250 companies of CRN’s 2017 Managed Service Provider 500 list. This annual list recognises the top North American solution providers who deliver innovative services that help businesses improve operational efficiencies, navigate the ever-changing IT landscape, and maximise their return on investment.

What exactly is preventive cyber-security?

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.