Protect Your Critical Data with Known Folder Move!

Data is usually rank #1 when asked of users in importance of their endpoints.  So, it is always somewhat strange that when asked if they keep a back up of their files, the answer is usually no.  Data is usually taken for granted by end-users, sometimes event saving them in improper places such as their […]

Simplify your Business Networks with Citrix SD-WAN!

You may have heard by now of the new technology that’s been getting a lot of buzz over the past years, software-defined WAN or SD-WAN.  This exciting technology enables organizations to reduce network complexity and cost while improving flexibility, security, availability, and visibility.  Citrix has made use of this technology and improved on the concept […]

New Vulnerability aLTEr Discovered by Researchers

Researchers from Ruhr-Universität Bochum & New York University Abu Dhabi have recently discovered three types of attacks/vulnerabilities for devices using Long-Term Evolution (LTE) network protocol that cyber criminals can use to steal your data.  The researched team has dubbed the attacks as “aLTEr”.  With LTE (a form of 4G) as a standard in the mobile […]

CT Link Tours Bahay Tsinoy!

With CT Link Systems, Inc. celebrating its 20th year anniversary in the IT industry this coming November, we have long thought that we should give back to the community that has helped us to reach this big milestone.  As an initiative of the company, CT Link has partnered with Kaisa Heritage Foundation for a CSR activity […]

Improve Productivity for Your Business with Microsoft Workplace Analytics

Microsoft’s Workplace Analytics and MyAnalytics leverage data to improve workplace productivity Do you have trouble multitasking your work tasks such as meetings, appointments and other projects?  If you do, Microsoft things that its data analytics tools may help you juggle these tasks.  They have just recently announced that it will be enhancing their productivity insight […]

Security Tips: Different Business Email Compromise (BEC) Schemes to Watch Out For

Business Email Compromise (BEC) Schemes In the past few years, millions of dollars have been lost to fraudsters and scammers.  However, not all have been lost through malware attacks such as ransomware.  Business email compromise (BEC) schemes are sophisticated attacks focused mostly on companies who do wireless transfers frequently.  The FBI have estimated that nearly […]