The 360IT Blog

360IT Partners’ print and electronic newsletters, archived here for your convenience

Virtualization

Understanding virtualization containers

The evolution of software containers has changed the way virtual computing is realized. It has diminished the risks of malware and the trouble of portability by allowing software vendors to package their products into virtual containers that can run from any desktop machine, regardless of hardware of operating system. Read on for our review of

Read More »
Security

Is two-step authentication the only way?

With all the recent hacking scares all over the world, you know and understand that your cyber security and your business’s cyber security are extremely important. However, when it comes to authentication processes, you may not be sure what the real deal is. There are two seemingly similar types of authentication that are often confused.

Read More »
Business

The benefits of internet monitoring

The internet is constantly tempting us. There’s an endless collection of funny cat videos, memes, and social media statuses to consume. Sure, the occasional three-minute YouTube video never hurt anyone, but if employees waste hours of their working day on these websites, that’s a problem. So how can you, as a business owner, discourage employees

Read More »
Virtualization

Microsoft secures its Edge browser

Thanks to Microsoft’s latest announcement, cyber-criminals will have a harder time breaking into Windows systems. By dropping the Edge browser into a separate virtual container, workstations put distance between themselves and those who would do them harm under cover of the internet. For business owners interested in getting a taste of virtualization before fully investing

Read More »
Social Media

Facebook at Work boosts communication

Facebook has been looking for new ways to diversify the services it offers. One such example is Facebook at Work — launching today. The new product is a way for enterprise firms to stay connected and share information just like the Facebook of yesteryears. There has been a need for the use of social tools

Read More »
Security

Cyber-crime and social engineering

For as long as there have been cybercriminals, there have been social engineers, or people who use tricks and scams to force other people to volunteer sensitive information. There are several ways to use social engineering to acquire valuable information like account passwords and bank accounts, but avoiding these scams comes down to one thing:

Read More »
Scroll to Top