Beyond Office: Maximizing and Securing your investments with Office 365

Are you Maximizing your Office 365 Investment? How about Securing Your Corporate Data? So your business has invested (or is looking to invest) in Office 365, you’ve made sure that every user has a subscription and everyone is fairly happy using all the familiar office apps like Word, Excel and PowerPoint.  This however is only scratching […]

Endpoint Security Redefined: OfficeScan to Apex One

Why Migrate to Trend Micro Apex One? The threat landscape used to be black and white – you kept the bad stuff out and the good stuff in. Now its harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often […]

Security Advisory: Microsoft Alerts to Patch for BlueKeep Vulnerability

In case you didn’t hear, another big vulnerability was reported by Microsoft on May 14, 2019 known as “BlueKeep” which takes advantage vulnerabilities of Remote Desktop Services (RDS), Remote Code Execution (RCE), and Remote Desktop Protocol (RDP).  However, BlueKeep only affects older version of Windows, so users of Windows 10 and 8 can rest easy.  […]

Building an Autonomous Data Center for your Philippine Business

Using Artificial Intelligence to Simplify operations – Unlock your Data’s Potential Your business can’t afford any disruptions or delays. And you want nothing more than to spend less time on infrastructure. However, the complexity inevitably leads to unexpected problems and your days, nights, and weekends consumed taking care of infrastructure.  This is where HPE InfoSight can help […]

Cloud Backup vs. BCDR: The Difference Between the Two Data Protection Strategies

When discussing whether business’ have a business continuity and disaster recovery (BCDR) in place, many would say that they have some in place but really only have Cloud Backup in place.  So, what is the difference between the two?  Cloud backup, simply put, is backing up your data to a remote cloud-based server which is […]

A Closer look at Processor Vulnerabilities

The past few years has been rough on processor security, this especially for Intel as one of the biggest processor vulnerabilities Meltdown and Spectre was for nearly all their modern CPUs.  Although patches came out almost immediately to solve these issues, this was just the start to the security vulnerabilities as other attacks such as […]