Imagine IT (i)nsights

Imagine IT Insights

NSA-approved: mobile virtualization

May 31st, 2017 Imagine IT 2017may31virtualization_a, mobile device management, cybersecurity, smartphones, virtualization 2017may31virtualization_a, mobile device management, cybersecurity, smartphones, virtualization

Amazon phones to become a reality soon

May 30th, 2017 Imagine IT 2017may30voip_a, alexa, amazon, amazon echo, smartphones, voip 2017may30voip_a, alexa, amazon, amazon echo, smartphones, voip

How to reduce data loss in Office 365

May 29th, 2017 Imagine IT 2017may29office_a, calendar sharing, compliance, mobile device management, multi-factor authentication, office, office 365, policy alerts, access management, data security, encryption, session timeouts 2017may29office_a, calendar sharing, compliance, mobile device management, multi-factor authentication, office, office 365, policy alerts, access management, data security, encryption, session timeouts

Windows 10 updates for Fall 2017

May 26th, 2017 Imagine IT 2017may26windows_a, newest, creators, fall, features, functions, update, windows, windows 10 2017may26windows_a, newest, creators, fall, features, functions, update, windows, windows 10

WannaCry: A historic cyberattack

May 25th, 2017 Imagine IT 2017may25security_a, perimeter security, phishing, Security, cybersecurity, employee training, malware, ransomware, software updates, wannacry 2017may25security_a, perimeter security, phishing, Security, cybersecurity, employee training, malware, ransomware, software updates, wannacry

Mac HandBreak downloads infected by Trojan

May 24th, 2017 Imagine IT 2017may24apple_a, apple, apps, handbrake, mac, macos, malware, trojan 2017may24apple_a, apple, apps, handbrake, mac, macos, malware, trojan

How to defend against WannaCry

May 23rd, 2017 Imagine IT 2017may23business_a, business, business continuity, cloud backup, security, antivirus, external hard drive, software update, wannacry, windows 2017may23business_a, business, business continuity, cloud backup, security, antivirus, external hard drive, software update, wannacry, windows

Web browser cybersecurity, ranked

May 22nd, 2017 Imagine IT 2017may22webandcloud_a, chrome, safari, cybersecurity, edge, firefox, internet explorer, Web & Cloud, web browsers 2017may22webandcloud_a, chrome, safari, cybersecurity, edge, firefox, internet explorer, Web & Cloud, web browsers

New phishing protection for Gmail on Android

May 18th, 2017 Imagine IT 2017may18android_a, mobile security, phishing, safe browsing, security, android, anti-phishing, gmail, google docs 2017may18android_a, mobile security, phishing, safe browsing, security, android, anti-phishing, gmail, google docs

Windows Server 2016 and virtualization

May 17th, 2017 Imagine IT 2017may17virtualization_a, containers, hyper-v, microsoft, software-defined storage, virtualization, windows server 2016 2017may17virtualization_a, containers, hyper-v, microsoft, software-defined storage, virtualization, windows server 2016

What to look for in a VoIP distributor

May 16th, 2017 Imagine IT 2017may16voip_a, business, assessment, distributor, growth, qualities, smb, sme, voip 2017may16voip_a, business, assessment, distributor, growth, qualities, smb, sme, voip

More security features for Office 365

May 12th, 2017 Imagine IT 2017may12office_a, compliance, office, office 365, security, advanced data governance, advanced threat protection, threat intelligence 2017may12office_a, compliance, office, office 365, security, advanced data governance, advanced threat protection, threat intelligence

Predictability coming to Windows 10 updates

May 11th, 2017 Imagine IT 2017may11windows_a, operating systems, patches, cybersecurity, microsoft, updates, windows, windows 10 2017may11windows_a, operating systems, patches, cybersecurity, microsoft, updates, windows, windows 10

The most advanced Gmail phishing scam yet

May 10th, 2017 Imagine IT 2017may10security_a, oauth, phishing, Security, cybersecurity, fancy bear, gmail, google 2017may10security_a, oauth, phishing, Security, cybersecurity, fancy bear, gmail, google

New malware threats on Mac computers

May 9th, 2017 Imagine IT 2017may9apple_a, apple, gatekeeper, mac, macos, malware 2017may9apple_a, apple, gatekeeper, mac, macos, malware

Ugly websites cost your business big time

May 5th, 2017 Imagine IT 2017may5business_a, business, businesses, online, effects, medium, presence, small, smb, sme, ugly, website 2017may5business_a, business, businesses, online, effects, medium, presence, small, smb, sme, ugly, website

The cloud is more secure than you think

May 4th, 2017 Imagine IT 2017may4webandcloud_a, cloud, security, data storage, disaster recovery, Web & Cloud 2017may4webandcloud_a, cloud, security, data storage, disaster recovery, Web & Cloud

Dropbox scanning now available in Android

May 2nd, 2017 Imagine IT pdf, 2017april2android_a, android, doc scanner, dropbox, dropbox paper pdf, 2017april2android_a, android, doc scanner, dropbox, dropbox paper

What celebrities can teach us about HIPAA

May 1st, 2017 Imagine IT compliance, phi, 2017april1healthcare_a, employee training, Healthcare, hipaa, mdm, url filtering compliance, phi, 2017april1healthcare_a, employee training, Healthcare, hipaa, mdm, url filtering