GIVE US A CALL 877.426.6834

Blog

The Linux “GHOST” Vulnerability

Ghost

Earlier this week, GHOST, a new security vulnerability in glibc, was announced.  Per Redhat’s release:
“GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library.

Author:

Dominic Lozano

Date:

January 29, 2015
Read More

Don’t Fall Asleep on Linux Security

Linux Penguin SIgn

Linux has been gaining popularity in recent years, and it’s easy to see why. This open-source, flexible platform powered by the GNU comes in multiple flavors and is endlessly customizable from the desktop and GUI right down to the kernel.

Author:

Tom Prindiville

Date:

January 28, 2015
Read More

Don’t Delay Your HIPAA Compliance

keyboard-doctor-300x199

Is your organization concerned about making the move to a HIPAA compliant cloud solution? You’re not alone.  Many customers come to us with questions and apprehension about embracing this technology.

Author:

Tom Prindiville

Date:

January 22, 2015
Read More

Three SaaS Predictions For 2015: Enterprises Look To The Cloud For Speed And Competitive Agility

SaaS

Enterprises will be facing increased competition in 2015, and will be required to adopt new technologies that add accuracy, clarity and speed to their strategies.  That’s why SaaS adoption will flourish in the enterprise during the new year.

Category:

Author:

Tom Prindiville

Date:

January 20, 2015
Read More

Why You Should Use Multifactor Authentication to Provide Secure Access

Lock on Keyboard

Computer hacking crimes continue to grow. High-priority break-ins at companies like Home Depot or Target get major publicity. Even when companies aren’t singled out as targets by hackers, their customers’ data is vulnerable to flaws like the Heartbleed bug.

Author:

Tom Prindiville

Date:

January 15, 2015
Read More

Cloud computing: Shaping the future of healthcare

Cloud

When people discuss the Affordable Care Act, talk often centers around the health insurance mandate or the various coverage options. They don’t always realize how ACA has transformed healthcare behind the scenes.

Author:

Melissa Hedge

Date:

January 12, 2015
Read More

Outsourcing IT: A Safer Choice for Your Data

who we serve slider-developer

It’s no secret that outsourcing IT resources is a good financial investment.

Author:

Melissa Hedge

Date:

January 8, 2015
Read More

Don’t Forget the People in Disaster Recovery

Recovery_Keyboard

We’re in the season where winter storms and other inclement weather often interrupt business. You may have wisely planned for such misfortunes by backing up your important data to remote servers and having procedures to restore them after the emergency.

Author:

Melissa Hedge

Date:

January 5, 2015
Read More

Contegix Welcomes Aaron Johnson

Aaron Johnson

 
Aaron Johnson
 
We are pleased to announce the addition of Aaron Johnson to the Contegix team. Aaron is joining Contegix as a 1st shift NOC Tech and started his new role today.

Category:

Author:

Tom Prindiville

Date:

January 2, 2015
Read More

Contegix Welcomes Rob Kelley

Rob Kelley

Rob Kelley
 
We are pleased to announce the addition of Rob Kelley to the Contegix team. Rob is joining Contegix as a 3rd shift NOC Tech and started his new role today.

Category:

Author:

Tom Prindiville

Date:

January 2, 2015
Read More
Live chat by BoldChat