Helpful Cortana commands for everyone

170px_shutterstock_435798766Cortana, Microsoft’s voice-activated personal assistant, is extremely helpful for day-to-day tasks. Whether you need her to reschedule a meeting or draft an email, she’s always happy to help. If you’re dealing with several time-consuming tasks, use these Cortana commands to make your life a lot easier.

Fileless malware is back, are you at risk?

2017March3Security_BHow many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk.

Is your disaster recovery plan up to par?

2017February28_Business_BNo matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of useful information. Read on for our three takeaways from the report.

WordPress websites under attack

2017February27_WebandCloud_BIt’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks. Recently, some 20 attackers defaced thousands of WordPress websites. If you think 20 attackers is frightening, wait ‘til you read more.

Which social media platforms suit your SMB?

170px_shutterstock_321247400The first thing that comes to mind when you think of social media is Facebook and for good reason. Not only does it boast the most users, but it also has the biggest reach and cultural impact. Since there is no one-size-fits-all social media platform, it’s imperative for small- and medium-sized businesses to examine their options before making an investment.

Vulnerabilities in popular printers

2017February23_Hardware_BWhat harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs. Today, we unveil the mechanics of this new cyber threat.

3 Common mistakes in virtualized networks

2017February21_Virtualization_BData storage may be one of the easiest facets of virtualization to explain, but that doesn’t make it immune to problems arising from confusion. There are a few things that can cause virtualized data storage to underperform, and most of them can be easily fixed by technicians who know their stuff. Read on to find out whether you might have fallen for one of these mistakes.

VoIP call forwarding: Do you need handsets?

2017February20_VoIP_BThe list of benefits that accompany a VoIP migration is long and conclusively proves that internet-based telephony is better than its analog predecessor. What is slightly less decisive however, is whether the liberating mobility of VoIP requires you to set up desktop phones at all. Read on for a few tips on making the right decision at your organization.

Be the first to enjoy new Office apps

2017February17_Office_BMicrosoft churns out new Office 365 features for users almost every month. Last year, there were several additions to Word, Excel, and PowerPoint that further enhanced user experience. This year, Microsoft will likely introduce new features that can benefit businesses. If you want to stay on top of new Microsoft features and experience these advantages yourself, then the Office Insider program is for you.