For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted. We’re only just easing into 2017 and we’ve […]
Fruitfly: the latest Apple malware
G Suite launches new features
Tech giant Google has always listened to customer feedback to make continuous improvements to its powerful suite of applications. And in the most recent case, Google Cloud’s G Suite has introduced five new updates. What do they include and are they worth getting excited about? Basic Mobile Management G Suite’s Basic Mobile Management offers an […]
An old virus gets a new shot at virtualization
Virtualizing your desktops comes with a number of benefits, one of which is improved security. Unfortunately, nothing perfect lasts forever, and the virtualization industry is facing a frightening new form of malware. Although this threat is nothing more than a facelift on an old virus, it is just as dangerous as it was the first […]
Check to see if any of your web accounts (e.g. LinkedIn, Dropbox, Facebook, etc.) have been compromised in a data breach
When you sign up for an online service e.g. LinkedIn, Online Banking, Forbes Online Magazine, Facebook etc. one of the criteria to sign up is a username (usually your email address) and password. The email address and password are stored in the service provider’s databases.
Simplify calendar sharing with Office 365
Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers. Unfortunately, it isn’t as easy as it sounds. Recently, Microsoft made changes to its calendar sharing function […]
5 great voice commands for Google Now
Google Now has been around for years, but the service still doesn’t have the name recognition of Apple’s Siri or Amazon’s Alexa. Considering that it is delivered on nearly every new Android device, it’s a crime that it doesn’t get more use. For a crash course in some of Google’s best AI-powered voice-commands, take a […]
How to protect against VoIP call hacking
VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases. That’s why businesses need security systems like an up-to-date session border controller (SBC) to protect against […]
Window 10’s biggest flaws addressed
In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems. Here are some of them: […]
Cyber security and managed services
Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]
Why consider disaster recovery for 2017
The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old […]