Blog

Technology Drives Medical Cannabis Dispensary

Making a Difference

Green Point Wellness is a licensed medical cannabis dispensary in Linthicum Heights, Maryland. Its goal is to promote wellness and patient freedom, and provide superior customer service to those in Anne Arundel County and the rest of Maryland. According to dispensary founder Tony Toskov, “By providing the highest quality products to suit the specific ailments of each patient, the whole community benefits by having alternative medical treatment choices.” Continue reading

How to Protect Your Business from Ransomware

Ransomware infections can be devastating, but the good news is that there are preventive measures you can take to protect your IT infrastructure from being hijacked:

  • Back-up all critical information and test backups regularly. Network-attached backups can also be affected by ransomware, so critical backups should be stored offline.
  • Continue reading

Free Your IT Team to Work on What Counts

There’s a better way for organizations to utilize their IT staff – free them up so they can work on strategic projects that improve competitive position, market share, and the bottom line.  To help you achieve this, NuLeaf can handle all of your day-to-day IT monitoring and maintenance, or just when you need some extra help.  Check out our ManageIT portfolio…

Continue reading

A Closer Look at Data Deduplication

Data deduplication is a method for reducing storage needs by eliminating redundant data so that only one unique instance of the data is actually retained on the storage media. Reducing the amount of data that needs to be transmitted across the network, especially to the cloud, can increase backup speeds and save storage costs.

Although new approaches to achieving data deduplication are continually being developed, here are the basic methods.

Continue reading

IoT Devices Now a Launchpad for DDoS Attacks

The proliferation of IoT (Internet of Things) devices offer numerous benefits for consumers when they plug devices such as cameras, light bulbs, thermostats, digital video recorders, refrigerators and other household items into the Internet. It is estimated that billions of IoT devices are in operation right now and their use is growing by leaps and bounds.

The lack of adequate security measures in these devices, however, poses serious risks to users and the greater Internet community. This is because vulnerabilities in IoT devices come from several sources:

Continue reading

Are Your IT Users Suffering from “Security Fatigue”?

A recent study by the National Institute of Standards and Technology (NIST) found that a majority of average computer users are experiencing “security fatigue” ̶  a weariness or reluctance to deal with security issues.

Typical examples of security fatigue include being tired of remembering usernames, passwords and PIN numbers; navigating multiple security measures; and dealing with account lockouts due to incorrectly entered passwords.

Continue reading

Cloud Adoption Grows, Getting Full Value Lags

Cisco has released the findings of a global study indicating that while cloud adoption continues to accelerate, few organizations are maximizing the value that cloud technology can offer.

According to the study, over 65% of organizations are using cloud to help drive business outcomes. Increased cloud adoption is being fueled by cloud-native applications, including security and Internet of Things (IoT) cloud-based solutions.

Continue reading