Will April showers bring May flowers? Only time will tell. For now, all we can do is revisit the month's most talked about stories. United Airlines faced backlash after a video showed a passenger being forcibly removed from a flight. After more than 20 years, Fox News forced out Bill O'Reilly amid sexual harassment allegations from multiple women. Samsung launched its Galaxy S8, nearly a year after the Galaxy Note 7 was recalled due to faulty batteries. While we count down to the the unofficial start of summer, let's recollect about Vology's five most viewed blog posts from April.
For the fourth month in a row, this blog has been a must-read. Will you have a redundant solution if you have redundant fiber optic connections between two buildings? No. Simple redundancy via two devices, systems, or fiber optic cable does not always result in resiliency. In this blog post, learn why your goal is to design a resilient solution.
Ask any IT professional and they'll tell you cybercriminals are more creative and dangerous than ever before. The fact is, hackers could easily put any small to mid-sized business out of business. Beginning today, start taking your network's security seriously. As you review your options for security solutions, this blog post will introduce you to the five must-have features.
How many hours have you spent going through hundreds (or even thousands) of resumes to fill a vacant position your IT department? It's unnecessary. Before you waste any more time, this blog will prompt you with four questions that will offer insight into a better alternative that can save you time and money.
Data Privacy Day, held annually on January 28, is long gone. But the reality is, your personal information is in jeopardy 24/7/365. It's crucial to understand how data is collected, managed, and used. “Personal information has value – just like money," said the Michael Kaiser, Executive Director of the National Cyber Security Alliance (NCSA). If data privacy is on the forefront of your mind, this blog post provides nine suggestions on how to properly safeguard your personal information.