7 most talked about Hyper-V features in Windows Server 2016

Microsoft has put a lot of effort into reshaping Windows for the modern cloud environment. These changes have affected the Hyper-V hypervisor as well. Launched in 2008, Hyper-V underwent many significant improvements over the years with every new iteration of Windows Server, and now that the 2016 edition has launched, it’s time to take a […]

Read More »

Dropbox Business price increase in 2017 – Why FileCloud Online can be a powerful alternative?

As IPO pressures mount, Dropbox has resorted to the familiar tactics to shore up their revenue – increase the price substantially and pray customers will not notice. In some scenarios, the price has gone up by 75% (fr0m 12.50$ to 20$). The long time customers who put their faith in Dropbox are getting the short […]

Read More »

The Intelligent Cloud : Artificial intelligence (AI) Meets Cloud Computing

If you thought that mobile communications and the Internet have drastically changed the world, just wait. Coming years will prove to be even more disruptive and mind-blowing.  Over the last few years, cloud computing has been lauded as the next big disruption in technology and true to the fact it has become a mainstream element […]

Read More »

Launching FileCloud 14 – Document Editing in Browser using Office Online Server, File Analytics, Mac Drive and much more …

Seamless document editing in browser, powerful business intelligence, file analytics and admin reports are added to FileCloud We are excited to announce the release of FileCloud 14, IT industry’s most versatile enterprise file sharing and sync platform. This release includes state-of-the-art new features, significant product improvements, bug fixes and enhancements. Here is the summary of major […]

Read More »

10 Windows Group Policy Settings – Must Get Them Right

If you are responsible for ensuring Windows 10 security in your organization, here are some of the lesser-known group security policy settings you need to be aware of. Ensure you get them right, always. https://assets.wired.com/photos/w_1423/wp-content/uploads/2015/08/windows10-microsoft-story.jpg 1. Use Kerberos and NTLMv2 instead of NTLMv1 and LM protocols Kerberos and NTLMv2 authentication protocols are much more secure […]

Read More »

10 indispensable PowerShell security scripts for Windows administrators

Out of numerous Windows admin tools, PowerShell is one of the most valuable tools. It offers scripting language flexibility and command line speed, making it incredibly effective to automate important security chores. Using PowerShell, Windows administrators gain the ability to automate various tasks, like managing users, deploying patches, and rotating logs. Using PowerShell isn’t difficult, […]

Read More »

What’s new with Microsoft Windows Server 2016?

Developed and launched by Microsoft under the Windows NT family of OS, Windows Server 2016 works best with Windows 10 version and above. New and upgraded version of the previous Server 2012, the 2016 version has introduced many innovations and changes that only add on to the functionality of your system. Let us discuss some […]

Read More »

Types of Controls to Manage Your Business Data in an EFSS

In 2015, there were 38% more security incidents than 2014, and an average cost per stolen record – containing sensitive and confidential data – of $154 (the healthcare industry payed the most, at $363 per record). Worse still, even when 52% of IT professionals felt that a successful cyber-attack against their network would take place […]

Read More »

Sharing Large Medical Images and Files – Factors to Consider

According to data collected by the HHS Office for Civil Rights, over 113 million individuals were affected by protected health information breaches in 2015. Ninety-nine percent of these individuals were victims of hacking, while the remaining 1 percent suffered from other forms of breach such as theft, loss, improper disposal, and unauthorized access/disclosure. A quick […]

Read More »

Data Owner Responsibilities When Migrating to an EFSS

While it is easy to say and conclude that all data belongs to your organization, complications arise when the person accountable for data ownership has to be identified. Even when the IT department spearheads the process of processing, storing, and backing up data among other functions, the fact is that it does not own business […]

Read More »