Blog

Hypervisors: potential risks and threats

March 21st, 2018
Hypervisors: potential risks and threats

The virtualization trend is still going strong, offering businesses streamlined resource management and massive cost-saving potential, but just like every technology, it has its fair share of security risks. In fact, a virtualization solution is only as secure as the hypervisors that support it.

How to optimize Office 365

March 16th, 2018
How to optimize Office 365

Out of the hundreds of Office 365 tools available to you, you’re probably using only 10-15% of them. This could be due to a lack of training or an unfamiliarity with some of the advanced options available in Word and Excel. But it’s easy to optimize your Office 365 investment by learning more about the following communication and collaboration features.

What’s causing slow Windows 10 updates?

March 15th, 2018
What’s causing slow Windows 10 updates?

All Windows 10 updates come with security fixes, exciting new features, and other assorted improvements, so it’s extremely important to install them as soon as they become available. Unfortunately, the updates’ downloads can take ages, and there are several reasons why this happens.

Equifax finds more users hit by major breach

March 14th, 2018
Equifax finds more users hit by major breach

Everyone thought the worst was over when credit-reporting agency Equifax revealed that the credentials of 145.5 million people in the US were leaked. However, the company recently discovered that there are more victims from the major breach. Here’s everything you need to know.

iPhone security vulnerabilities revealed

March 13th, 2018
iPhone security vulnerabilities revealed

In a recent report published by Forbes, a major U.S. government contractor and Israel-based vendor called Cellebrite revealed their capacity to unlock every iPhone on the planet. This new addition to their services was specifically generated for law enforcement and forensic specialists.

Google Drive now allows comments on MS files

March 8th, 2018
Google Drive now allows comments on MS files

Google applications mostly comprise collaborative tools that are regularly updated to address your growing needs. With their new Google Drive update, gone are the days of converting files just to add a comment because you can now easily comment on the files in the ‘Preview’ pane.

Safe web browsing requires HTTPS

March 7th, 2018
Safe web browsing requires HTTPS

How many times this month have you paid for something online using your credit card? Was each payment page secured by HTTPS? If you’re not 100% certain, you’re a prime target for identity theft. The padlock icon in your web browser’s address bar is immensely important and it requires your attention.

Top business phones according to Google

March 6th, 2018
Top business phones according to Google

The mobile market is populated with a staggering variety of Android smartphones. Not only do you have to choose between several phone manufacturers like Samsung and HTC, but there are also other considerations like computing power, software features, and design.

3 ways to avoid Spectre and Meltdown

March 5th, 2018
3 ways to avoid Spectre and Meltdown

Due to Spectre and Meltdown, thousands of healthcare providers are at risk of data leakage, which can result in lawsuits and reputation loss. As such, institutions will need to be more proactive about their cybersecurity. Read on to learn how to secure your confidential files.

Virtual desktop or Container: How to choose

March 2nd, 2018
Virtual desktop or Container: How to choose

It’s getting harder and harder for small-business owners to make informed IT decisions. There’s a paradox of choice as the market becomes overrun with solutions that are equal parts affordable and confusing. Today we’re going to make your life a little easier by breaking down why you should care about the virtual desktops vs.