Blog

Denial of service attacks on VoIP systems

When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the biggest threats to these systems […]

How Apple plans to improve cloud services

Apple is planning to improve its cloud services by bringing together its various teams who work on projects like iCloud, Siri, Apple Maps, Apple Pay, Apple Music and Apple News into one campus. The involved personnel are expected to relocate to the current company’s Infinite Loop campus in Cupertino, California, rather than to the second […]

How web monitoring increases productivity

The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are harmless, but if employees spend […]

Android Pay: everything you need to know

Technology companies have been pushing phone-based payment methods for years now. And the various vehicles for this type of transaction are surprisingly similar, right down to their names: Apple Pay (for iPhones) and Android Pay (for Android devices). For those who have been waiting for Google’s mobile wallet to find its footing, we believe that […]

Windows 10 migrations just got easier

Last month Microsoft announced that over 400 million devices have Windows 10 installed. But despite the general consensus that those adoption rates are a huge success, Microsoft wants more. Because one of the biggest obstacles to large-scale migrations is varied compatibility among workstation hardware and software, a new tool has been released to analyze and […]

Microsoft Edge browser becomes more secure

Microsoft’s Edge browser has enhanced its security features with new virtualization protocols. By running the browser inside a virtual container, it keeps web content totally separate from the Edge browser and your hard drive. Although it’s a much smaller scale than what we are used to seeing out of Microsoft’s virtualization strategies, this is a […]

Facebook releases enterprise messaging app

Facebook is constantly working to improve communication between different parties. What started as a means to communicate socially is now used to improve communication at work, too, through Facebook at Work. After spending several years trying to find a way to turn FB into an enterprise solution, Facebook at Work will finally be launched today. […]

Social engineering and cyber security

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about […]