Blog

Office 365 users face new phishing scam

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on. What makes it different from […]

6 ways to flood-proof your business IT

Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan. Here are a few […]

Protect yourself from this Facebook threat!

Despite the apparent break from international ransomware attacks, hackers are still keeping themselves busy, this time using an adware campaign that could easily be one of their most cunning tricks yet. If you use Facebook Messenger, you need to read this. What is it? Little is known about the adware itself or those behind it, […]

Virtualization 101: Running Windows on a Mac

If you own an Apple computer, you might think it’s impossible to install Windows-based software on it. But with operating system (OS) virtualization, you can run any application you want and enjoy exciting new cross-platform features. Configure an entire machine with a few clicks With programs like VMware and Parallels, installing Microsoft’s OS on your […]

How to use OneNote like a pro

Can you list all the apps in the Microsoft Office suite? Did you forget OneNote? It’s often overlooked, but Microsoft’s note-taking app is incredibly useful for everything from brainstorming sessions to learning courses. Let’s go over what it takes to get started with OneNote. OneNote is a digital notebook Despite the visual similarities, the thing […]

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started […]

The values of Amazon AppStream 2.0

Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions. […]

Containers will soon be much easier to manage

Microsoft continues to be one of the biggest names in virtualization, and with its most recent announcement about a new type of container technology, it’s not going anywhere. Even if you don’t need containers in your IT framework, Microsoft has signalled that big things are coming. What are virtual containers? Virtual containers are isolated computing […]

Microsoft adds new Office 365 apps for SMBs

Office 365 is the ideal productivity tool for small- and medium-sized businesses. It’s cost-effective and receives plenty of support and upgrades from Microsoft. During last month’s Inspire conference, they announced even more applications for Office 365 that you will love. Microsoft Connections Email marketing campaigns are a great way to build relationships with contacts and […]

It’s time to redefine the word “hacker”

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history Since all […]

Just released: 5 Big Ways IT Outsourcing Can Boost Your Company's Productivity eBook CtaDownload now!
+