Blog

Don’t fall for distributed spam distraction

February 8th, 2018

Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack.

Enhance your new laptop in 5 steps

February 6th, 2018

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start exploring your new toy.

Virtual DR for ransomware protection

February 2nd, 2018

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions.

Microsoft unveils 4 search features for Bing

February 1st, 2018

Have you ever tried asking your search engine something to no avail? With many of us facing this problem, Bing has been updated with four new features that give users more thorough answers and enable it to respond to broader search terms.
Validating answers using many websites
Before the recent update, Bing would answer questions based on what it found on a single website.

New VoIP feature released by Skype

January 29th, 2018

With more targeted attacks on social networking services than ever, private conversations with your business partners can become public information. To prevent this, Skype has released a new feature that ensures complete privacy by encrypting all types of communication.

Groups, Yammer, and Teams defined

January 26th, 2018

Office 365 is chock full of so many apps that it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft Teams.

Enlist IT help when installing CPU updates

January 24th, 2018

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk.

3 simple and easy cyber-security tips!

January 22nd, 2018

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us!
Cover up your webcam
There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised.

Critical browser vulnerabilities discovered

January 19th, 2018

The Chrome, Safari, Microsoft Edge, and Firefox browsers may not be as safe as you think. Security researchers recently discovered that computer chips manufactured in the past two decades contain major security vulnerabilities. One can be used by hackers to gain access to sensitive data.

Should you use UPS for your network gear?

January 18th, 2018

Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPSs for your networking equipment, including cable modems, wireless access points, and routers.