Login 

Sagacent Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

Are Ghosts Haunting the Halls of Your Servers?

Posted by on in Security

b2ap3_thumbnail_haunted_pc_400.jpgThough not everyone believes them, we all know about the horror stories of the spirits of the dead that linger in this world, haunting locations where no one dares to tread. Every culture, though their beliefs vary, contains them to some degree. Their purpose is unknown, and they are thought to be caused by unfulfilled desires or regrets. But regardless of whether or not you believe in them, you better believe that your business can very well be haunted by ghost servers.

Tagged in: Holiday Security Server
0
Continue reading 0 Comments

4 Giant Traits that Make up a Championship Business

Posted by on in IT Blog

Be a champion in your field with SagacentCham·pi·on noun “A person who has defeated or surpassed all rivals in a competition.” People know a champion when they see one. In the case of our San Francisco Giants, they defeated their AL rivals the Kansas City Royals to become the 2014 World Series Champions. Yeah! Is your San Jose business a giant champion in your arena of enterprise?

...
0
Continue reading 0 Comments

b2ap3_thumbnail_data_wipe_from_android_400.jpgJust for one second, try to imagine your life without your personal mobile device. Mobile devices has pervaded our very existence, and they are integral tools for connecting to your business’s network. But even with this colossal amount of data on the device, some people still manage to lose them. What would happen if your smartphone fell into the hands of one of your competitors, or even a hacker?

0
Continue reading 0 Comments

b2ap3_thumbnail_disaster_recovey_not_just_backup_400.jpgA thorough data backup is important for your business continuity plan, and so is a fast and efficient disaster recovery solution. What's that? Aren't those the same thing? Unfortunately, the two concepts are far from the same thing, but many business owners are still under the impression that their data backup is also a disaster recovery solution.

0
Continue reading 0 Comments

Tip of the Week: How to Write a Professional Email

Posted by on in How To

b2ap3_thumbnail_write_email_400.jpgWhether you like it or not, email is a standard communication method used by businesses around the world. Sometimes it can be difficult to come up with the right things to say, especially when you’re under pressure to respond. Thankfully, with the right formula, writing a good email doesn’t have to be nearly as hard as you might think it is.

0
Continue reading 0 Comments

Warning: Updated Cryptowall Ransomware Strikes Again

Posted by on in Security

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

Tagged in: Alert Hackers Security
0
Continue reading 0 Comments

Stadium TechnologyThis football season marks the grand opening of the San Francisco 49ers’ new home, Levi’s Stadium. At a cost of more than $1.2 billion, this 68,500 capacity arena is the most technologically sophisticated sports stadium ever constructed. In addition to attending games and cheering on our 49ers while they make another playoff run, your business can learn a thing or two from Levi’s Stadium about running a successful business in Northern California.

0
Continue reading 0 Comments

3 Paths for the Internet of Things

Posted by on in Cloud

b2ap3_thumbnail_internet_of_things_paths_400.jpgWhether the world is ready for it or not, the Internet of Things (IoT) is on its way. As such, there is a lot of controversy about what actually constitutes the Internet of Things. Infoworld argues that a lot of what the public claims to be part of the IoT, is actually not a part of it, and that we need a more substantial definition for this oncoming phenomenon.

0
Continue reading 0 Comments

b2ap3_thumbnail_hoteling_is_the_new_trend_400.jpgAs technology continues to improve, workers are able to be more efficient and do more with less. In the name of efficiency, new technology changes things, including the office layout. "Hoteling" is the latest office trend in workplace efficiency, and with the right technology, you can organize your office in this new way and gain maximum collaboration out of your team!

0
Continue reading 0 Comments

b2ap3_thumbnail_it_equipment_theft_400.jpgHow often do you deal with your company-owned IT equipment? Some businesses keep detailed records of their equipment and use security measures and policies to prevent theft; but if your business doesn't protect its equipment, you could be digging a hole into your budget without realizing it.

0
Continue reading 0 Comments

b2ap3_thumbnail_badusb_is_dangerous_400.jpgThis past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

Tagged in: Hardware Malware USB
0
Continue reading 0 Comments

b2ap3_thumbnail_your_query_is_blocked_400.jpgThe Internet is a vast and wonderful plain of many fruits and resources, but there are two sides to everything. It can also be a vile and disgusting place, with content that could make even the most hardened criminal flinch (or stare in astonishment). Keep your network safe by implementing a content filtering solution for your business.

0
Continue reading 0 Comments

b2ap3_thumbnail_nfl_fcc_400.jpgIt's football season! Many NFL fans are spending their Sundays glued to their TV sets cheering on their favorite team. This season, those in the tech industry who are concerned about net neutrality have also taken an interest in football--primarily due to a recent FCC ruling.

0
Continue reading 0 Comments

b2ap3_thumbnail_microsoft_logo_400.jpgWhat we expected to be Windows 9 has been gradually revealed through leaks over the past several weeks, but Microsoft has thrown a curveball into the mix with Windows 10. The latest information, revealed during a public Microsoft Windows event, has gone into much detail concerning the nature of the newest incarnation of Windows, including its focus on enterprise and cloud-centric policy.

0
Continue reading 0 Comments

b2ap3_thumbnail_apt_hack_400.jpgWorking with technology can get pretty complicated and technical at times. We're here to help. We've got plenty of technology tips to share with the world, and we're going to unleash them on you once a week. For more helpful tech tips, search our previous blog articles. This week's tip will help you spot a nasty APT hack on your company's network.

0
Continue reading 0 Comments

Automation: Is it Suffocating Real-World Talent?

Posted by on in Technology

b2ap3_thumbnail_automation_at_work_400.jpgTechnology grows more powerful and complex every day, and there have been increasing efforts to automate certain repetitive tasks. In the near future, we may be able to look at fully automated assembly lines. While most companies are concentrating on what this means for their budgets, automation could very well be a threat to jobs around the world.

0
Continue reading 0 Comments

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

Tagged in: Alert Malware Security
0
Continue reading 0 Comments

b2ap3_thumbnail_are_review_sites_good_400.jpgOne California restaurant owner has recently taken on an interesting marketing strategy that goes against all conventional wisdom. Co-owner David Cerretini of the Italian restaurant Botto Bistro tells his strategy to USA Today, "I want to be the worst restaurant in the San Francisco area!" Strangely enough, his approach seems to be working.

0
Continue reading 0 Comments

b2ap3_thumbnail_it_strategies_400.jpgWith so many new trends popping up in today's technology industry, it's only natural that a change of pace, or even a change in strategy, be considered by any business hoping to take advantage of what the world has to offer. Your company needs to adapt to change if it hopes to be successful in the future business world.

0
Continue reading 0 Comments

b2ap3_thumbnail_outlook_logo_400.jpgAs a business owner, your email contacts list is probably chock-full of clients and customers you've met over the years. This can make it difficult to find your target without sifting through countless names. Instead of getting flustered by an unorganized list, try sorting your contacts in various ways.

0
Continue reading 0 Comments




LiveZilla Live Help

I would like a 30 minute business discussion with Sagacent

Fill in your information below and we will be in contact with you shortly.

Occasionally, Sagacent will share relevant IT information with you via email.