How to Manage a Virtual Team with Video Conferencing

How to Manage a Virtual Team with Video Conferencing

By | Phones & Communication, Telecommuting, Video Conferencing

Video conferencing is a technology that has continued to mature and flourish. Businesses are increasingly reliant on such services for enhanced communications and real-time consulting with customers, service providers, and virtual teams. The emphasis on video conferencing is largely due to the following factors: Improved technology that offers more reliable…

Read More
The Latest Cybersecurity Threat: Banking Trojans

The Latest Cybersecurity Threat: Banking Trojans

By | Cybersecurity, Email Security, Hacking, Network Infrastructure & Security, Viruses, Trojans, Ransomware and other Malware

Trojans are a broad category of malware that was first described as a theoretical computer vulnerability by the US Air Force in 1974. Since then, they’ve become some of the most insidious and dangerous types of malware in existence. One type, known as the banking trojan, specializes in stealing financial…

Read More
Can Facial Recognition Technology Enhance Public Safety?

Can Facial Recognition Technology Enhance Public Safety?

By | Law Enforcement & First Responders, Public Safety, Public Service, Security & Surveillance

Facial recognition technology is a highly controversial topic that’s sweeping through the United States, sparking debate about its place (or lack thereof) in the modern environment. Already implemented elsewhere around the world, the US has seen only relatively minimal adoption of the technology in a few isolated scenarios. However, in…

Read More
How Resilient Infrastructure and Technology Is as Important as Disaster Recovery

How Resilient Infrastructure and Technology is as Important as Disaster Recovery

By | Business Continuity & Disaster Recovery (BCDR), Cloud Computing, Compliance/Regulations, Cybersecurity, Data Security & Backup, Network Infrastructure & Security

Disaster recovery planning is a necessary part of business planning, but it involves more than just preparing for the worst-case scenario. Building resilient infrastructure and technology is just as important. By taking this approach, a company ensures that it has the means to respond and adapt to sudden, unpredictable events…

Read More
Woman working from home on laptop sipping coffee by a window

Working from Home: Secure, Efficient & Effective Telecommuting

By | Coronavirus/COVID-19, Managed Services, Network Infrastructure & Security, Special Series

CDS is currently offering FREE consultations for businesses looking to implement a work from home solution. Contact us for details! It doesn’t take a world-wide crisis to see the benefits of providing employees with flexible options for executing their responsibilities. Right now, businesses around the world are scrambling a bit…

Read More
Don’t Fall Victim to the Latest Ransomware Scam this Tax Season

Don’t Fall Victim to the Latest Ransomware Scam This Tax Season

By | Cybersecurity, Phishing, Viruses, Trojans, Ransomware and other Malware

It’s another tax season, and while most companies scramble to file their Internal Revenue Service (IRS) returns, scammers will be looking to capitalize on the chaos. Con artists use this time to elicit sensitive information from individuals and businesses, using the IRS as their preferred moniker. Falling victim to a…

Read More
Hacking News: Why Hackers Are Targeting Your Home Security Cameras

Hacking News: Why Hackers Are Targeting Your Home Security Cameras

By | Cybersecurity, Hacking, Network Infrastructure & Security, Security & Surveillance

Technology is the primary enabler of the modern economy. The rise of the internet with all its bells and whistles lead to an information revolution. Today’s companies and individuals have more access to information on-demand than ever before, but this comes with a host of risks. “Attack surface” isn’t a…

Read More
How to Recover from the Past Year with an Efficiency Audit

How to Recover from the Past Year with an Efficiency Audit

By | Cybersecurity, Data Security & Backup, Network Infrastructure & Security, Sustainability

Managers are always pushing their employees to do more with less. The best managers will continuously look for opportunities to streamline bloated processes and reduce operational overheads. Unfortunately, managers are just as likely to become too busy with everyday issues and may no longer have the bandwidth to carry out…

Read More