Blog

Beware of the Cloudbleed bug

Cloudflare, an internet security services company, found a major bug in its software that leaked sensitive data like cookies and passwords from client websites. Although investigation into the security flaw, also known as Cloudbleed, is still underway, early reports found that malicious hackers have not exploited this vulnerability.

Is your Android smartphone a security risk?

Desktop and laptop users install security software updates and do everything they can to safeguard against cyber attacks. The same cannot be said of smartphone users. This is understandable because cyber threats on mobile phones are less visible… but that doesn’t mean they don’t happen.

A beginner’s guide to Snapchat for business

The 21st century is the age of social media, with a plethora of outlets available, users are spoilt for choice. Business owners are faced with the same dilemma, between Facebook, Instagram, Twitter, and about thirty more – which one should they invest in? It’s important that the platform is simple, interactive, and touches base with […]

Are SDN & network virtualization the same?

Nobody’s perfect, even IT technicians. We’ve seen plenty of people interpret software-defined networking and network virtualization as the same exact service, but it’s time we clear up the difference. It’s small, but it could be the difference between major cost savings and a small increase in functionality.

Selecting the perfect Office 365 plan

Office 365 Business, Business Premium, Enterprise E1, E3, and E5. Each of these Office 365 plans offer different features and services. Implement the wrong one, and you may end up with a solution that doesn’t fully meet your company’s needs. To help your business select the right Office 365 license, we’ve summarized and listed the […]

Helpful Cortana commands for everyone

Cortana, Microsoft’s voice-activated personal assistant, is extremely helpful for day-to-day tasks. Whether you need her to reschedule a meeting or draft an email, she’s always happy to help. If you’re dealing with several time-consuming tasks, use these Cortana commands to make your life a lot easier.

More healthcare firms migrate to the cloud

Healthcare providers have a lot on their plate: Caring for patients is first and meeting compliance regulations comes at a close second. Hospitals and smaller practices truly benefit from technology experts coming on-site, installing all the right IT systems, and leaving clearly outlined instructions, amounting to a swift and inexpensive process.

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary.

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it.

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of […]