Press Release: Centre Technologies Honors First Winners of Debut Technology Scholarship

August 26, 2015

Houston, TX – August 26, 2015 – Centre Technologies, a ...

Security and Compliance 101: Staying On Top of Information Security

August 24, 2015

The stress to keep up with security and compliance regulations can ...

What is PCI Compliance?

August 18, 2015

PCI DSS, or Payment Card Industry Data Security Standard, are ...

The Role of Physical Security for Network Security

August 12, 2015

What is Physical Security? Physical security is exactly what it ...

What Does it Take to be a HIPAA Compliant Technology Company?

July 29, 2015

Modern IT solutions companies have to know their clients’ business ...

Why Do Businesses Turn to MSPs for IT Managed Services?

July 28, 2015

According to new research by CompTIA, more businesses are turning ...

What is Technology?

July 20, 2015

The word “technology” originates from the Greek words “techne” and ...

How to Ninja-Proof Your Data – A Cybersecurity Infographic

July 13, 2015

They’re crafty, covert, and silent.  They have the tools, skills, ...

C-Stack Series: What are Servers?

July 9, 2015

What are servers? Enterprise servers are the beating heart of your ...

IT Business Continuity After a Gulf Coast Hurricane

June 30, 2015

A Gulf Coast hurricane, for lack of a more elegant phrase, is not ...

Why Does Your Recovery Point Objective Matter?

June 23, 2015

Recovery point objective, or RPO, is a critical metric in the ...

Is Cloud Safe for Healthcare Information?

June 15, 2015

Within the last two years, breaches of healthcare information have ...

Subscribe to Email Updates

Categories

See all