Resources

Resources

Tips to reduce risks after a security breach

June 28th, 2018
Tips to reduce risks after a security breach

No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home Depot, which compromised millions of personal customer information. That said, no business is completely helpless, either. The following steps can minimize the risks to your business in the event of a large-scale data breach. Determine […]

7 Must-Have Office 365 Add-Ons

June 22nd, 2018
7 Must-Have Office 365 Add-Ons

Microsoft Office 365 is one of the most successful and popular apps in the world, at 135 million commercial users and counting. To further boost user experience, it also offers a range of time-saving, productivity-boosting add-ons. #1. StaffHub You can now easily keep track of your employees’ work hours, allow employees to swap shifts, and […]

Malware strain infects 200k more devices

June 20th, 2018
Malware strain infects 200k more devices

Yet another global malware infection has been making headlines and the story just took a turn for the worse. When the news of VPNFilter broke, experts warned that 500,000 devices were already infected, but now they believe that number is much higher. Thankfully, it’s not too late to protect yourself. VPNFilter recap A team of […]

Highlights from the Apple WWDC 2018

June 19th, 2018
Highlights from the Apple WWDC 2018

Apple’s yearly Worldwide Developers Conference (WWDC) has come to a close. Engineers from Apple met and exchanged ideas with developers in the event, while consumers looked forward to updates on existing products and news about future innovations. Here are the highlights that stole the show. A more personal, faster iOS 12 Apple has focused on […]

Should you worry about the new IoT malware?

June 15th, 2018
Should you worry about the new IoT malware?

A malware infection is one of the worst things that could happen to your Internet of Things (IoT) devices. But some users don’t even know there are IoT-targeted attacks that threaten computers, networks, and data. Rebooting an IoT device is a simple way to remove malware, but for those already infected with the latest strain, […]

HTTPS matters more for Chrome

June 14th, 2018
HTTPS matters more for Chrome

HTTPS usage on the web has taken off as Chrome has evolved its security indicators. HTTPS has now become a requirement for many new browser features, and Chrome is dedicated to making it as easy as possible to set up HTTPS. Let’s take a look at how. For several years, Google has moved toward a […]

Workplace app overload and its ill effects

June 13th, 2018
Workplace app overload and its ill effects

Apps are supposed to make life easier in the workplace. But if you use too many of them working at one time, things can get messy. This is a familiar problem in many small businesses that rely on several apps and software for daily operations. The confusion drains funds and reduces employee productivity, as a […]

More teens leaving Facebook for other sites

June 11th, 2018
More teens leaving Facebook for other sites

More teenagers are leaving Facebook for other online platforms that feature images or videos and give them more control over who can be their friends. Based on a new Pew Research Center survey, only 51% of US teens are using Facebook. By contrast, 69% of US teens were reported to be using Snapchat, 72% Instagram, […]

Microsoft Office 365 to block Flash

June 6th, 2018
Microsoft Office 365 to block Flash

A few weeks ago, Microsoft made an announcement to block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365. While the developers have their reasons for implementing this, they should have pulled this feature earlier to avoid many irate customers. Microsoft recently announced plans to eventually […]

Healthcare: Prevent insider threats

June 5th, 2018
Healthcare: Prevent insider threats

Healthcare is the only industry where insider threats pose the greatest threat to sensitive data, with 58 percent of security incidents coming from people working within the organization itself. Here’s a look at five ways to prevent such breaches. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and […]