New cyber-threats in 2017 to watch out for

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends. Knowing […]

Protect yourself from this iPhone video bug

Although iPhone bugs and malware are typically unheard of, there’s one circulating the web that you should be aware of right now. The bug, which was discovered in Reddit, is a brief, five-second video that when played causes your iPhone to freeze and ultimately crash. So far the malicious video’s intentions are still unknown, but […]

Android backdoor poses huge security risk

An issue has recently been identified with Android devices that may put users at risk of being exposed to a massive data security breach. A backdoor in Android devices and operating software makes it possible for personal data to be transmitted and viewed by people in China. So what created this vulnerability? Android devices are […]

New features keep Office 365 users safe

The new features recently unveiled by Office 365 promise to bring business owners to a more secure and knowledgeable position in which to make important decisions regarding the future of their corporation. Microsoft expanded the popular program’s basic scope to include data protection and productivity tools, including the replacement of Delve Analytics with the MyAnalytics […]

What’s the best way to verify user identity?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]

Social engineering and personal security

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information. If you’re worried about the ability […]

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today. […]

Are your VMware machines up to date?

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case. VMware, one of the leading virtualization software vendors, […]

HIPAA liability: record settlement reached

Is being responsible for electronic medical records a daily source of trepidation for you or your business? While the sentiment is understandable, it often results from a lack of understanding about what HIPAA compliance actually means. As industry-wide penalties continue to rise every year, it’s essential to take a closer look at who is being […]

Why Skype for Business Over Skype?

It’s hard to deny how reliable Skype is as a VoIP telephony system. Having something good doesn’t mean you should stop at that; for the sake of your small- or medium-sized business, you should always be on the lookout for the next best thing that helps facilitate your company’s growth. Enter Skype for Business. We’ve […]