Imagine IT (i)nsights

Imagine IT Insights

NSA-approved: mobile virtualization

May 31st, 2017 Imagine IT 2017may31virtualization_a, cybersecurity, mobile device management, smartphones, virtualization 2017may31virtualization_a, cybersecurity, mobile device management, smartphones, virtualization

Amazon phones to become a reality soon

May 30th, 2017 Imagine IT 2017may30voip_a, alexa, amazon, amazon echo, smartphones, voip 2017may30voip_a, alexa, amazon, amazon echo, smartphones, voip

How to reduce data loss in Office 365

May 29th, 2017 Imagine IT 2017may29office_a, access management, calendar sharing, compliance, data security, encryption, mobile device management, multi-factor authentication, office, office 365, policy alerts, session timeouts 2017may29office_a, access management, calendar sharing, compliance, data security, encryption, mobile device management, multi-factor authentication, office, office 365, policy alerts, session timeouts

Windows 10 updates for Fall 2017

May 26th, 2017 Imagine IT 2017may26windows_a, creators, fall, features, functions, newest, update, windows, windows 10 2017may26windows_a, creators, fall, features, functions, newest, update, windows, windows 10

WannaCry: A historic cyberattack

May 25th, 2017 Imagine IT 2017may25security_a, cybersecurity, employee training, malware, perimeter security, phishing, ransomware, Security, software updates, wannacry 2017may25security_a, cybersecurity, employee training, malware, perimeter security, phishing, ransomware, Security, software updates, wannacry

Mac HandBreak downloads infected by Trojan

May 24th, 2017 Imagine IT 2017may24apple_a, apple, apps, handbrake, mac, macos, malware, trojan 2017may24apple_a, apple, apps, handbrake, mac, macos, malware, trojan

How to defend against WannaCry

May 23rd, 2017 Imagine IT 2017may23business_a, antivirus, business, business continuity, cloud backup, external hard drive, security, software update, wannacry, windows 2017may23business_a, antivirus, business, business continuity, cloud backup, external hard drive, security, software update, wannacry, windows

Web browser cybersecurity, ranked

May 22nd, 2017 Imagine IT 2017may22webandcloud_a, chrome, cybersecurity, edge, firefox, internet explorer, safari, Web & Cloud, web browsers 2017may22webandcloud_a, chrome, cybersecurity, edge, firefox, internet explorer, safari, Web & Cloud, web browsers

New phishing protection for Gmail on Android

May 18th, 2017 Imagine IT 2017may18android_a, android, anti-phishing, gmail, google docs, mobile security, phishing, safe browsing, security 2017may18android_a, android, anti-phishing, gmail, google docs, mobile security, phishing, safe browsing, security

Windows Server 2016 and virtualization

May 17th, 2017 Imagine IT 2017may17virtualization_a, containers, hyper-v, microsoft, software-defined storage, virtualization, windows server 2016 2017may17virtualization_a, containers, hyper-v, microsoft, software-defined storage, virtualization, windows server 2016

What to look for in a VoIP distributor

May 16th, 2017 Imagine IT 2017may16voip_a, assessment, business, distributor, growth, qualities, smb, sme, voip 2017may16voip_a, assessment, business, distributor, growth, qualities, smb, sme, voip

More security features for Office 365

May 12th, 2017 Imagine IT 2017may12office_a, advanced data governance, advanced threat protection, compliance, office, office 365, security, threat intelligence 2017may12office_a, advanced data governance, advanced threat protection, compliance, office, office 365, security, threat intelligence

Predictability coming to Windows 10 updates

May 11th, 2017 Imagine IT 2017may11windows_a, cybersecurity, microsoft, operating systems, patches, updates, windows, windows 10 2017may11windows_a, cybersecurity, microsoft, operating systems, patches, updates, windows, windows 10

The most advanced Gmail phishing scam yet

May 10th, 2017 Imagine IT 2017may10security_a, cybersecurity, fancy bear, gmail, google, oauth, phishing, Security 2017may10security_a, cybersecurity, fancy bear, gmail, google, oauth, phishing, Security

New malware threats on Mac computers

May 9th, 2017 Imagine IT 2017may9apple_a, apple, gatekeeper, mac, macos, malware 2017may9apple_a, apple, gatekeeper, mac, macos, malware

Ugly websites cost your business big time

May 5th, 2017 Imagine IT 2017may5business_a, business, businesses, effects, medium, online, presence, small, smb, sme, ugly, website 2017may5business_a, business, businesses, effects, medium, online, presence, small, smb, sme, ugly, website

The cloud is more secure than you think

May 4th, 2017 Imagine IT 2017may4webandcloud_a, cloud, data storage, disaster recovery, security, Web & Cloud 2017may4webandcloud_a, cloud, data storage, disaster recovery, security, Web & Cloud

Dropbox scanning now available in Android

May 2nd, 2017 Imagine IT 2017april2android_a, android, doc scanner, dropbox, dropbox paper, pdf 2017april2android_a, android, doc scanner, dropbox, dropbox paper, pdf

What celebrities can teach us about HIPAA

May 1st, 2017 Imagine IT 2017april1healthcare_a, compliance, employee training, Healthcare, hipaa, mdm, phi, url filtering 2017april1healthcare_a, compliance, employee training, Healthcare, hipaa, mdm, phi, url filtering