Backup

5 Ways CloudDrive Makes Offices More Productive

5 Ways CloudDrive Makes Offices More Productive

Many consumer-grade file sync services work well for basic file sharing, but offer little else in the way of advanced features. Meridian's CloudDrive, on the other hand, can transform the way people collaborate and do business.

What is the Cloud? And Where is it?

What is the Cloud? And Where is it?

There has been a ton of talk about the cloud. Cloud this, cloud that. But what actually Is the cloud? It’s okay if you don’t know, most people don’t understand it and even some tech people tend to wave their hands towards the sky when trying to explain it!

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

WannaCry Ransomware: Is Your Business At Risk?

WannaCry Ransomware: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning. 

Why System Updates Are Important!

Why System Updates Are Important!

A MASSIVE RANSOMWARE attack spread across the globe early Friday morning, locking up thousands of hospital, telecommunications, and utilities systems in nearly 100 countries. The attack used data stolen from the NSA to exploit vulnerabilities in Microsoft Windows and deliver the WanaCrypt0r ransomware. The demand was for $300 per PC. 

Spring Clean your PC, Remove & Prevent Malware

Spring Clean your PC, Remove & Prevent Malware

Cyber criminals frequently and automatically scan websites and PCs with different types of malware, to see if there are vulnerabilities they can use to gain entry to your system. Outdated programs provide these cyber criminals with an easy path to your computer.

How to stay safe and secure online in 2017

How to stay safe and secure online in 2017

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors around the world.

7 Ways to Secure Your Smartphone

7 Ways to Secure Your Smartphone

Smartphones are so small and portable that it is easy to forget that you have a powerful computer in your pocket or purse. However, they are increasingly becoming the target of theft, ransomware, viruses, and other types of malware.

5 Ways to Protect Your Data in the Cloud

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data.

How to prevent malware infection

How to prevent malware infection

Yes, it’s possible to clean up an infected computer and fully remove malware from your system. But the damage from some forms of malware, like ransomware, cannot be undone. If they’ve encrypted your files and you haven’t backed them up, the jig is up. So your best defense is to beat the bad guys at their own game.

5 Ways Your Employees Might Be Putting Your Business at Risk

5 Ways Your Employees Might Be Putting Your Business at Risk

Employees can be your most valuable asset — and your biggest security nightmare. Sometimes, they engage in risky behaviors without even realizing they are doing so. Taking work home, for example, might seem innocent enough, but it can put holes in your security defenses.

Understanding Cloud Technology

Understanding Cloud Technology

The cloud is virtual and therefore does not require any hardware of your own to deliver a service. Cloud technology can deliver that service to you, without having to install anything or have it on a server at your business.

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

With cloud computing well into the mainstream and steadily replacing roles currently filled by traditional server architecture, it's time to ask the big question: can cloud hosting replace traditional file servers for storing and sharing files between employees in your organization? 

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

How to Protect Your Business from Ransomware Attacks

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016.

5 Easy Ways to Free Up Space on Your Computer

5 Easy Ways to Free Up Space on Your Computer

More and more people are starting to use solid-state drives (SSDs). This type of drive is smaller but faster than mechanical hard drives. While SSDs will boost the speed of everything that needs disk access, they can fill up pretty quickly.

4 Things to Do after You Set Up a New Computer

4 Things to Do after You Set Up a New Computer

Buying a new computer is exciting. Once it is set up, you might be tempted to immediately use it to surf the web or try out some new programs. It is best to resist that temptation, though. Computers right out of the box are outdated and vulnerable to cybersecurity threats.

5 Signs Your Hard Drive is About to Fail

5 Signs Your Hard Drive is About to Fail

Whether you have a solid state or mechanical drive there is always a chance the device will fail. Regardless of the type of drive, your computer usually will show subtle signs of a pending disk failure. Paying attention to these signs can save you from unexpectedly losing the data stored on your drive.

How to secure your laptop fleet

How to secure your laptop fleet

When the corporate network proves difficult to penetrate, hackers start looking for softer targets. This can include laptops your employees use to access the work network.

BACK UP DON'T PAY UP!

BACK UP DON'T PAY UP!

When it comes to ransomware, it’s not the ransom that’s so damaging to your business. It’s the downtime.  Just ask the folks at Hollywood Presbyterian Medical Center.