24 03, 2020

Remote Hands for Businesses

March 24th, 2020|Uncategorized|Comments Off on Remote Hands for Businesses

For IT services scrambling to cover the needs of their clients at this time, ComputeInTheCloud offers Remote Hands. With over 20 years of experience remotely supporting our clients, we have the resources to assist when your staff is overwhelmed. We offer professional rates to partners. Visit us at http://supportinthecloud.com or contact us here.

21 03, 2020

Resources for companies with new Work From Home requirements

March 21st, 2020|Uncategorized|Comments Off on Resources for companies with new Work From Home requirements

For businesses who are burdened with the expense of deploying specific hardware devices to their end user, ComputeInTheCloud is here to assist. If you’re maintaining VPNs to secure remote user connections, there are solutions that are less expensive and complicated to deploy. By adding inexpensive hardware or virtual systems, secured remote access can be achieved

15 01, 2020

Security Vulnerabilities fixed in Firefox 72.0.1 and Firefox ESR 68.4.1 — Mozilla

January 15th, 2020|Uncategorized|Comments Off on Security Vulnerabilities fixed in Firefox 72.0.1 and Firefox ESR 68.4.1 — Mozilla

An important update. Most users who run Firefox will be automatically updated, but if you are prompted to update your Firefox when you start it, please do not defer or ignore it. Source: Security Vulnerabilities fixed in Firefox 72.0.1 and Firefox ESR 68.4.1 — Mozilla

10 01, 2020

Tricky Phish Angles for Persistence, Not Passwords — Krebs on Security

January 10th, 2020|Uncategorized|Comments Off on Tricky Phish Angles for Persistence, Not Passwords — Krebs on Security

Office 365 users - - - TAKE NOTE: I believe this is an important issue to be aware of. Source: Tricky Phish Angles for Persistence, Not Passwords — Krebs on Security

7 01, 2020

Getting to the bottom of the difference between: cloud sync, backup and storage | TechRadar

January 7th, 2020|Uncategorized|Comments Off on Getting to the bottom of the difference between: cloud sync, backup and storage | TechRadar

Many modern users of computing resources include in their normal day-to-day operations inclusion of storage resources such as OneDrive, Google, Amazon S3, DropBox, etc. Do these resources represent a safe harbor for your data or are they prone to data loss and malware attacks like local storage resources.  This article helps understand what's what. Source: