Technology changes at a very fast pace. Users struggle to keep up, but hackers seem to always find the vulnerability in the system to cause havoc on the network. One of the most common vulnerabilities are passwords and how easy it is to crack them to gain access to network…Continue Reading..
Contact: Brad McLean, Cloud Technologies, Inc. 205.484.2400 [email protected] Cloud Technologies, Inc. Partners With Master Agent to Offer Nationwide Telecom Services Across Multiple Carriers Recent Partnership Agreement Gives Greater Flexibility in Selling High Speed Internet and Private Networks For Mid-Size to Large Customers Birmingham, Ala., March 15, 2017 – Cloud Technologies, Inc. (www.cloudtechinc.com), a Birmingham, Ala.-based technology company, announced…Continue Reading..
March 14, 2017 by: Jeff Freeman, VP of Technology at Cloud Technologies Companies that connect all their locations together will utilize a Wide Area Network (WAN) to handle the traffic between sites. The most popular WAN out there today is MPLS, but it does have some competition that will soon be a…Continue Reading..
Microsoft publishes their end of support lifecycle dates and they are freely available on their website. We have created a table of some of the most common Operating Systems and Office Suite dates for you to review in one place. It is very important to make sure you keep your…Continue Reading..
The cost of high speed internet access has steadily declined over the past decade. Many businesses purchase bandwidth on a 36 month contractual basis and rarely revisit the cost unless it become a necessity. Cloud Technologies has partnered with many companies that are nearing the end of a contract. We…Continue Reading..
February 20, 2017 by: Jeff Freeman, VP of Technology We are often asked to compare the difference between installing an Exchange Server at the corporate office versus utilizing Office 365 in Microsoft’s Cloud. Exchange Server is Microsoft’s email server platform and is used for businesses to collaborate and exchange information in several…Continue Reading..
by: Jeff Freeman, VP of Technology February 1, 2017 A website becomes encrypted through the addition of a secure socket layer (SSL). This is a protocol that uses a cryptographic system to keep data sent over the internet private. You can usually tell that a website is encrypted when you see the…Continue Reading..
Large and Small companies are looking to leverage the capabilities of the cloud to enhance the recoverability of their infrastructure Cloud Technologies BDR (Backup & Disaster Recovery Server) Cloud Technologies BDR solution offers the backup and recovery capabilities that will keep you prepared for disaster recovery events when they happen. Being able to…Continue Reading..
Why should I use a Cloud Based Spam Filter? Regardless of where your email is hosted, it is critical to provide adequate defense against security threats. And if you want a strong line of defense against email borne threats (and what business doesn’t?) then believing that your email platform is sufficient…Continue Reading..