Blog

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it. According to […]

Why G Suite users should use Cloud Search

Formerly known as Springboard, Google Cloud Search is the newest tool available to business customers that allow users to search across G Suite products such as Drive, Gmail, Sites, Calendar, Docs, Contacts and more. It’s been described as something like Google Now exclusively for enterprise workers. Google Cloud Search is designed for larger corporations where […]

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of […]

WordPress websites under attack

It’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks. Recently, some 20 attackers defaced thousands of WordPress websites. If you think 20 attackers is frightening, […]

Which social media platforms suit your SMB?

The first thing that comes to mind when you think of social media is Facebook and for good reason. Not only does it boast the most users, but it also has the biggest reach and cultural impact. Since there is no one-size-fits-all social media platform, it’s imperative for small- and medium-sized businesses to examine their […]

Vulnerabilities in popular printers

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs. Today, we unveil the mechanics of this […]

Be the first to enjoy new Office apps

Microsoft churns out new Office 365 features for users almost every month. Last year, there were several additions to Word, Excel, and PowerPoint that further enhanced user experience. This year, Microsoft will likely introduce new features that can benefit businesses. If you want to stay on top of new Microsoft features and experience these advantages […]

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are […]

Add-in support for Mac’s Microsoft Office

Support is defined as providing assistance, encouragement, or comfort to help someone achieve a certain goal. For Mac’s version of Microsoft Office, support comes in the form of add-ins that aim to enhance user experience. Although usability testing is currently underway, you can still read about the latest developments here: Office add-ins are applications running […]