*
EOFY Sales are here! – Check out these top EOFY tech deals

Wayne Rash

Wayne Rash's IT Watch Column: www.pcmag.com/it-watch Wayne Rash is a freelance writer and frequent r
Wayne Rash

Wayne Rash's IT Watch Column: www.pcmag.com/it-watch Wayne Rash is a freelance writer and frequent reviewer of enterprise hardware and software. He is also a Senior Columnist for eWEEK. Email him at [email protected] Follow him on Twitter @wrash.

    • Dialpad

      AI-driven features and a slick softphone are this platform's highlights

      2 years, 3 months By Wayne Rash, Paul Ferrill
    • Avoid these 10 VoIP Deployment Traps

      The remote work new normal has made voice over IP (VoIP) the standard for business communications, but without careful planning your rollout could turn into a nightmare. Here are ten potential pitfalls to avoid.

      2 years, 6 months By Wayne Rash
    • Line2

      No-frills VoIP for your SMB

      3 years, 2 months By Wayne Rash
    • When to Use a VPN to Carry VoIP Traffic

      With so many workers laboring from home these days, managing specific kinds of traffic has become tricky. Virtual Private Networks (VPNs) can help secure data, but using them to protect performance-sensitive streams like voice over IP (VoIP) requires some tweaking.

      4 years, 1 month By Wayne Rash
    • Amazon Web Services

      Amazon Web Services can run various services and support a range of operating systems. Its universal appeal is further strengthened by its intuitive setup process, management, and monitoring features earning it our Editor's Choice selection in IaaS solutions.

      4 years, 8 months By Wayne Rash, Steven Vaughan-Nichols, Steven J. Vaughan-Nichols
    • Want to Improve Your IT Career? Train Yourself

      Regardless of whether you're happy about your current career progression or not, adding security skills to your portfolio is practically a requirement for any branch of IT. We explore several online resources that you can use right now to sharpen your IT security know-how.

      4 years, 11 months By Wayne Rash
    • The Serverless Computing Lie And When To Use It

      Just because the name 'serverless computing' is misleading doesn't mean it's not a good way to save money and simplify your life. But only for certain kinds of workloads.

      4 years, 11 months By Wayne Rash
    • Why Your Business VoIP System Might Not Belong in the Cloud

      Managed voice over IP (VoIP) vendors insist the best place for your phone service is in the cloud. But there are several practical reasons why some or all of it should remain on the premises. Here's how to know what's best for your business.

      5 years By Wayne Rash
    • Why Small Businesses Need to Adopt Enterprise-Grade IT

      Your small business may not be a Fortune 500 corporation, but that doesn't mean you can afford to settle for substandard IT practices or equipment. In honor of National Small Business Week, we'll explain four areas in which you can and should act like a big business.

      5 years, 1 month By Wayne Rash
    • Invisible Malware Is Here and Your Security Software Can't Catch It

      Sophisticated attackers are now using "invisible malware," a new form of attack that your firewalls can't stop and your anti-malware software can't find nor remove. Here are steps you can take right now to protect your servers and network.

      5 years, 1 month By Wayne Rash
    • Higher-End Laptops Can Save Your Company Money

      Companies are buying their employees the best laptops available, not because they're executive toys but because they can up productivity and retention, boost efficiency, and even save on per-user IT costs.

      5 years, 2 months By Wayne Rash
    • DIY Penetration Testing to Keep Your Network Safe

      Penetration testing, or pen testing, is used to ensure that your enterprise is protected against cyberattacks and, with a little work, it's possible to take care of the basics yourself.

      5 years, 2 months By Wayne Rash
    • How To Block Unauthorised VPNs

      Cloud services have made it easy for users to deploy their own virtual private networks (VPNs), which can have security and performance consequences for your network. Here's how to control unauthorized VPN use.

      5 years, 3 months By Wayne Rash
    • How to Avoid a SCADA Scandal

      The irony of an operational technology network is that it represents your single biggest area of vulnerability while also being the network you think about least. Which is strange, because it's also the one connecting devices that are probably core to your company's business process.

      5 years, 3 months By Wayne Rash
    • You Need to Protect Your Website Against Formjacking Right Now

      Formjacking is a new type of attack that's being compared to ATM skimmers, except that, with formjacking, it's nearly impossible for users to find out that they're being attacked until it's too late. That's why it's up to IT pros to defeat this threat.

      5 years, 3 months By Wayne Rash
    • Businesses Need to Understand the Risk of VPN Services

      If you're a consumer, then virtual private network (VPN) services are a good way to protect your information from prying eyes. But for IT professionals and businesses, the situation can be very different. Here's why.

      5 years, 3 months By Wayne Rash
    • Requiem for the DMZ

      A demilitarized zone (DMZ) is a type of network segmentation that used to be mandatory for any organization connected to the internet. But the cloud has made a DMZ unnecessary for the majority of IT environments and here's why.

      5 years, 4 months By Wayne Rash