Blog

Android phone makers skip critical updates

April 24th, 2018
Android phone makers skip critical updates

Watch out Android users, your smartphone may not be as secure as you thought it was. A study has found that a few Android manufacturers may have accidentally skipped crucial software updates despite saying they constantly keep their products up to date.

Things you didn’t know about virtualization

April 23rd, 2018
Things you didn’t know about virtualization

In the past decade, virtualization has been considered one of the most cost-effective business solutions. It’s supposed to prevent unnecessary hardware purchases and promote effective IT management, but there are some hidden drawbacks with this technology.

Microsoft improves security in Office 365

April 19th, 2018
Microsoft improves security in Office 365

It’s becoming more and more difficult to ensure privacy and security in the applications we use today. Microsoft is well aware of the anxiety that Office 365 users face, which is why they recently introduced these new security capabilities in Outlook, OneDrive, and its apps.

Microsoft rolls out flashy Windows update

April 18th, 2018
Microsoft rolls out flashy Windows update

The Spring Creators Update for Windows 10 will begin rolling out soon, and unlike its predecessors, this one can be installed in under half an hour. It also comes with some noteworthy new features. Let’s take a tour of the most useful additions for small businesses.

What are watering hole attacks?

April 17th, 2018
What are watering hole attacks?

When talking about cyberattacks, the first one that usually comes to mind is phishing, a scam that uses email to spread malware or steal personal information. But hackers have a new method to infiltrate your systems, and it’s surprisingly effective.

Time Machine: How to back up your Mac

April 13th, 2018
Time Machine: How to back up your Mac

It is widely believed that Macs are the most trusted computers today. Unlike other computers, they don’t crash often and are better protected against viruses and other malware. But despite their outstanding qualities, Macs are still susceptible to theft, and even crashes.

Is your cloud solution going over budget?

April 12th, 2018
Is your cloud solution going over budget?

The cloud is the perfect solution for small- and medium-sized businesses like yours. For a small monthly fee, you get access to cutting-edge technologies and 24/7 support from a team of cloud experts. But without proper management, cloud costs can quickly go over your budget.

Non-financial blockchain solutions

April 10th, 2018
Non-financial blockchain solutions

Despite internet connections that deliver information to the other side of the globe in milliseconds, countless industries still rely on slow and inefficient middlemen to complete transactions. From supply chain management to hi-tech contracts, blockchain isn’t just about money, it’s about an entirely new way to do business.

Is your Android call and SMS data safe?

April 6th, 2018
Is your Android call and SMS data safe?

It’s normal for mobile phones to store users’ call and text logs. Android users, however, might be surprised to know that Facebook has been collecting their call history and SMS data for years. Should you be worried?

How Facebook’s data-collecting activities were discovered

Software developer Dylan McKay realized Facebook had been collecting his call records and SMS metadata when he downloaded his Facebook account data from his Android device (to do this, go to General > Settings). When he tweeted about it, several users responded that the same thing happened to them, while others revealed that only call histories with close contacts such as parents, partners, and other family members were collected.

Virtualization and Windows Server 2019

April 5th, 2018
Virtualization and Windows Server 2019

Microsoft’s Windows Server operating systems are complicated enough to warrant their own certification program. However, small businesses can take full advantage of the features included in the latest version of this software by moving to an outsourced IT support model.