Blog

The lowdown on cloud security

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different.

When Microsoft stops supporting Windows

When Microsoft stops supporting Windows

Microsoft only supports each version of Window for a certain period and the end of its support for a software product can be a significant challenge for businesses. Currently, Windows 7 is on "extended support" until January 14, 2020. What does it mean when Microsoft terminates support of your Windows version? Let’s have a closer look.

Apple’s second product launch for 2018

Apple’s second product launch for 2018

Apple launched a couple of products in September. As usual, it’s just slim pickings — we were treated to three variants of the iPhone and the latest model of the Apple Watch. However, the trillion-dollar company was apparently not yet done, as it launched yet even more devices on October 30. Check out the additional lineup below.

Obsolete firmware poses security risks

Obsolete firmware poses security risks

Are you still using that old computer that is not-so gracefully aging and devaluing? Maybe you are running important programs on older machines with old operating systems since they “still work fine.” While it might still help you get the job done, there may be hidden security risks that can lead to major problems later on.

The benefits of technology business reviews

The benefits of technology business reviews

Small- and medium-sized businesses don’t have the time to maintain IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything runs smoothly, it’s important to be proactive and conduct technology business reviews when you can.

3 ways to browse the net safely at work

3 ways to browse the net safely at work

Amidst the current climate of malware, hacks, and phishing scams, the internet really isn't safe for any company that doesn't take precautions. Without safeguards, browsers that you or your employees use are vulnerable to cyber attacks that may cripple productivity and profit.

Container facts you’re misunderstanding

Container facts you’re misunderstanding

Virtualization and container technologies are confusing topics in their own right, and comparing and contrasting them is even harder. To understand the differences between container and virtualization technologies, it’s best to clear up some commonly misunderstood information on how they work.

Don’t be a VoIP eavesdropping victim

Don’t be a VoIP eavesdropping victim

In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping.

4 handy Cortana commands for you

4 handy Cortana commands for you

You’ll find Cortana, Microsoft's voice-activated personal assistant, extremely helpful for daily tasks, like rescheduling meetings, drafting an email, or dealing with several other time-consuming work. Learn how to use the following Cortana commands to make life so much easier for you.

Office 365 beefs up anti-phishing measures

Office 365 beefs up anti-phishing measures

There are plenty of things to love about Office 365. For a small monthly fee, it gives you the latest cloud-based version of Microsoft Office apps and robust communication tools that improve collaboration and productivity. But it’s also an extremely secure platform that can defend against the most cunning phishing attacks.