GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

All Posts

Tech News Recap for the Week of 1/12/2015

Were you busy last week? Here’s a quick tech news recap of articles you may have missed from the week of 1/12/2015.

Tech News Recap

Tech News RecapVerizon's cloud came back 40 hours after a scheduled outage. The number of attacks against the travel industry continues to grow; this time it was United Airlines MileagePlus accounts. CENTCOM's twitter account was also hacked. 80% of online adults are now on a smartphone, however less than 10% use wearables. There were also some good articles around cloud spending, big data, business continuity and some predictions for what's in store around end user computing, security and cloud as we head into 2015.

{8-Point Checklist to a Successful Data Center Move from CTO Chris Ward}


By Ben Stephenson, Emerging Media Specialist


Related Posts

CIO Fireside Chat Recap: Responding to a Ransomware Attack

By Mario Brum, VP of Practice Area and Technical Advisory Services, GreenPages   Mario Brum hosted our inaugural CIO Fireside Chat, an online event for business executives and IT experts about the latest tech topics and trends. In this blog post, Mario recaps the discussion on responding to ransomware attacks and shares data from a real-time poll showing how top cybersecurity leaders responded to this controversial topic. 

How Microsoft Purview Simplifies and Secures Your Organization's Data

By David Barter, GreenPages Microsoft Technologies Practice Lead Managing disparate data sources is a challenge for today's hybrid workforces. But Microsoft Purview can simplify your data security, governance, and compliance.

Why MFA Is a Must-have Cybersecurity for Business

By Jay Martin, GreenPages Security Practice Lead Multifactor authentication can protect today's hybrid workforces from cyberattacks designed to steal, destroy, or ransom a company's extremely valuable data.