About Tom Donovan

This author has not yet filled in any details.
So far Tom Donovan has created 3 blog entries.

Top 6 Benefits of Moving Your Business to the Cloud

Organizations of all sizes are perpetually looking for ways to improve operations in an effort to most effectively fulfill their mission. For many, technology is a tool to increase efficiency and provide analytics into meaningful data sources. Public cloud services offer organizations a comprehensive toolset aimed at increasing efficiency, streamlining operations, reducing risks and increasing value. The Microsoft Azure cloud solution is a multi-faceted resource stack that every organization should be critically considering.

By |2024-09-16T11:39:05+00:00June 5, 2019|Cloud|0 Comments

SECURITY ALERT! New Threat Attacks Routers and Network Storage Devices

A new threat which targets a range of routers and network-attached storage (NAS) devices is capable of knocking out infected devices by rendering them unusable. The malware, known as VPNFilter, is unlike most other Internet of Things (IoT) threats because it is capable of maintaining a persistent presence on an infected device, even after a reboot. VPNFilter has a range of capabilities including spying on traffic being routed through the device.

By |2024-09-16T11:43:46+00:00May 29, 2018|Cybersecurity|0 Comments

An Enterprise Action Plan to address Meltdown and Spectre

Undoubtedly, in recent days you’ve heard about the Meltdown and Spectre security vulnerabilities making headlines. If you’re unsure of what Meltdown and Spectre are – spend a few minutes searching the internet, and you’ll find plenty of excellent articles explaining what the vulnerability is. In short, Meltdown is a security flaw that could allow malicious hackers to bypass the hardware barrier between applications run by users and computer’s core processing memory, which is normally highly protected. Spectre is slightly different; it potentially allows hackers to trick otherwise error-free applications into give up secret information.

By |2024-09-16T11:47:16+00:00January 9, 2018|Cybersecurity|0 Comments
Go to Top