Entries by Rafi Kronzon

Internet Outage: When the Lights Flickered

Last Friday, a seminal internet attack took place, affecting many well known web sites and services, including Amazon, Netflix, Box.com, and many others. This attack was important for two reasons. First, experts knew it was coming and still couldn’t stop it. Second, this attack used the so-called “Internet of Things” (ioT), which consists of internet […]

Your Personal Password Plan

A few days ago, Yahoo revealed that a suspected 2014 security breach generated enough media to give us a much-needed respite from the presidential campaign. Some simply recycled the same old password resetting advice, some boldly predicted apocalypse, and some entertained us with CYA articles from within Yahoo. Leaving behind the hyperbole, the only certainty […]

The Problem with Microsoft OneDrive

Since its inception in 2007, Microsoft OneDrive for Business, a cloud file sharing tool, has been plagued by marketing missteps. Given Microsoft’s Azure and Office 365 excellent launches into the cloud space, OneDrive’s inability to gain market share among IT departments or consultants is a head-scratcher. Compared to its main rivals Box, Dropbox, and Google […]

Blockchain: change is coming

Few people outside of the tech industry have heard of blockchain, which is the technology behind Bitcoin. Many technology experts believe that over the next decade, blockchain will revolutionize how we do business. Today, almost all business transactions, whether paying a vendor, buying an item on eBay, or trading stocks, take place through an intermediary […]

The Weakest Link in your Company’s Security Plan? It’s You

Best practices for cybersecurity at small-medium sized businesses (SMB) usually focus on network security, operating system patches, password management, and monitoring. While these practices are important components of every security plan, the lowest-hanging fruit for potential attackers has shifted over the last few years. As more businesses have moved their email servers and other sensitive applications […]

When the Clouds Darken

Moving your critical technology services such as email, file sharing and storage, and even basic document editing is the best investment you can make to improve up-time, accessibility, security, and disaster recovery for your business’s technology ecosystem. However, there is no such thing as 100% up-time. Over the past few years, Microsoft Office 365, Google […]

Even Presidents Need Tech Support

Everyone of a certain age, or with an aging parent, knows that adapting to new technology doesn’t always come easy to our country’s seniors.  But what about to our presidential candidates? Let’s take a quick look at our front-runners, and see how they would fare juggling the demands of running the country while keeping up with […]

Wired to Believe

Although the Internet as we know it is now approximately 25 years old, with an entire generation born into a plugged-in world, internet fraud continues to grow. Whether it’s mind-numbingly stupid rumors (no, Mark Zuckerberg is not giving away $4.5M to 1,000 users), mildly convincing pleas for help from abroad, (But wait, isn’t Aunt Bess dead?), […]

The Custom Software Conundrum

I recently met  a potential client that desperately needs a new CRM (customer relationship management) and calendaring system. They have been using a custom-built system (Filemaker based) hosted on their own server, as well as an integrated calendaring system, also hosted on their own server. While these systems had been working for years, they have […]

Google Keep

While Evernote has been a part of my life for a couple of years now, the application has slowly morphed into a behemoth.  I think the majority of people who want a note-taking application only need the following features:   Ease of use online and mobile Offline usage Quick search/find Note sharing (e.g. shopping lists) […]