network

Cyber Security Threats – Proactive Rather Than Reactive

Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...

WiFi – Secure? Think Again!

When it comes to WiFi, most would claim their network is secure and that there is little to worry about when it comes to someone in your neighborhood breaking into your network, but what happens when you combin...

Finally-Malwarebytes Enterprise Edition

Malware is difficult and one of the most hateful things that bva has to deal with each month with the accounts that we support.  bva has many good tools that help clean individual machines but nothing that mana...

Virtual Desktop Infrastructure-VDI-Pro’s and Con’s

In the past 6 months BVA has seen a tremendous push towards (VDI) Virtual Desktop Infrastructure which is unique in my eyes, for the most part it is because we have come full circle.  About 10 years ago there w...

New Samsung Galaxy Tab Unit – T-Mobile

T-Mobile’s has come out with their first Android tablet, the Samsung Galaxy Tab.  It is a good piece of hardware, but it doesn’t have enough great apps to be compelling.  It’s hard to compete ...

iPad Can Be Used With Verizon Wireless

Verizon and Apple seem to be having problems about getting the iPhone on its network and being able to sell it.  It’s pretty funny that as a result, the carrier is getting the iPad instead. Apple and Veri...

iPad and iPhone Can Be a Security Risk

BVA has found that these types of mobile devises if not provisioned correctly can seriously be a security risk to your network environment.  Security policies need to be set forth to ensure security at all leve...