Blog

Beware of sneaky Microsoft Office malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office. What’s the new Office threat? […]

Watch out for the huge KRACK in WiFi security!

A fundamental flaw with WiFi networks has recently been discovered by two security researchers. According to their reports, the KRACK vulnerability renders advanced encryption protocols useless and affects nearly every wireless device. Read on to find out more about KRACK hacks and how you can defend against them. What is KRACK? Simply put, KRACK, short […]

Cisco utilizes AI and Machine Learning

IT systems are becoming increasingly complex to manage, so much so that humans alone can no longer make sense of them. As such, there is a growing demand for technologies that can help simplify and automate business IT. According to Cisco, the inception of artificial intelligence (AI) and machine learning has accelerated that ability even […]

New features from Dropbox Professional

Have you ever calculated how much productivity was lost on time spent deciding which files to delete and which to keep because your computer’s hard disk ran out of space? With Dropbox’s new plan, you’ll never have to worry about running out of hard drive space again. Read on to see why. Stop worrying about […]

How to setup secure guest Wi-Fi

Today, Wi-Fi isn’t only crucial for your employees to get work done, it’s also a necessary amenity for your office guests. But there’s a right and a wrong way to set up guest Wi-Fi and the latter can result in a frustrating experience for users. So, how do you set up guest Wi-Fi properly? Never […]

Mobile device security and virtualization

Securing mobile devices is incredibly difficult. They often have privileged access to sensitive data that they connect to via unprotected network connections. Virtualization vendors are finding ways to include solutions to these problems in their products and they’re perfect for small businesses. Mobile device management and virtualization Simply put, mobile device management (MDM) is about […]

Microsoft’s plans for Skype for Business

Office 365 users received big news about what’s happening to its VoIP platform during the 2017 Ignite conference. According to Microsoft, Skype for Business will eventually be replaced by Teams — an all-in-one collaboration platform that rivals popular tools like Slack. If you’re currently using Skype for Business, here’s what you need to know. Upgrades […]

Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you. The problem The issue isn’t necessarily that NIST […]