Ransomware: What It Is And How To Fight It

Ransomware is a dirty, dirty word. It’s the latest cyber crime to sweep the globe and it cost business and industry more than $325M in 2015, according to a report by the Cyber Threat Alliance.  Bored with simply stealing credit card numbers, inventive criminals have turned to infecting computing environments with malware — delivered via […] View Post

Whitehat Virtual Security Bulletin – September 2016

Whitehat Virtual Security Bulletin – September 2016  View Post

Why the 10 Largest Healthcare Systems Rely on Citrix Everyday

Beyond being the 10 largest healthcare systems in the United States, collectively representing almost 17% of all of the hospital beds in the United States (150,892 of the 902,202 hospital beds, I checked),  what do HCA, CHS, Tenet Healthcare, Ascension Health, Catholic Health Initiatives, Trinity Health, Kaiser Permanente Health Foundation, LifePoint Health, Dignity Health, and […] View Post

Top 3 Reasons why Citrix Login’s are Slow

INTRODUCTION: The Citrix login process is arguably one of the most important in that the login process is where end users get their first impression of the overall Citrix experience.  Desktop virtualization projects have failed solely based on the metric of login times with end users refusing to adopt the new environment because of slow […] View Post

What is VDI? Why Does This Technology Exist? In plain English.

What IS a virtual desktop?  What is VDI?  Why does this technology exist?  Why do companies buy this stuff?  What problems does VDI solve?  What is in it for the End User? I have heard and answered these questions and many more related  to virtual desktops for a very long time, so I though a […] View Post