HTS Blog

Bluetooth users beware!

June 2nd, 2017

Bluetooth technology helps simplify our daily lives -- it allows for hands free communication, a quick and easy way to share content with friends, family, colleagues, and more. In fact, 45 percent of Americans have Bluetooth enabled across multiple devices.

NSA-approved: mobile virtualization

May 31st, 2017

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security.

Amazon phones to become a reality soon

May 30th, 2017

Amazon is setting its sights on the VoIP market again and will use its Alexa technology to launch a new phone system. Based on a new patent, users of Amazon’s artificial intelligence (AI) devices might soon be able to enjoy a smart speaker and phone in one.

How to reduce data loss in Office 365

May 29th, 2017

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. And while those of you with Microsoft Office 365 installed have some security and compliance tools, there are still some data protection best practices you need to consider.

Windows 10 updates for Fall 2017

May 26th, 2017

Windows 10’s Fall Creators Update is the next major update that Microsoft will roll out in September. Besides reusing the same "Creators Update" name and focusing on bringing the Windows experience to iOS and Android devices, here are some noteworthy features users can expect.

WannaCry: A historic cyberattack

May 25th, 2017

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

How to defend against WannaCry

May 23rd, 2017

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release.

Web browser cybersecurity, ranked

May 22nd, 2017

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start.

4 Tips for better server management

May 19th, 2017

With so much technology moving to the cloud, onsite servers aren’t getting as much attention as they used to. Optimizing this critical piece of business technology is no small task, but there are a few simple things you can do to ensure the success of your in-house servers.

Windows Server 2016 and virtualization

May 17th, 2017

Virtualization is a great way to save money and increase the efficiency of your existing IT hardware, but how exactly do you implement a virtualization solution? There are several vendors that provide software solutions, but there’s one almost everyone has already worked with: Microsoft.