With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on.
Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan.
Despite the apparent break from international ransomware attacks, hackers are still keeping themselves busy, this time using an adware campaign that could easily be one of their most cunning tricks yet. If you use Facebook Messenger, you need to read this.
You can easily lower your IT budget by better managing your print infrastructure. It sounds too good to be true, but it’s totally doable. Companies big and small follow inefficient printing models without even realizing it, but you can break the mold by following these tips: Replace outdated printers Outdated and cheap printers may be […]
You are probably familiar with desktop-based ransomware like Petya, WannaCry, CryptoWall, and CryptoLocker. But mobile ransomware is an emerging trend you don’t want to learn about only after it strikes. Take a minute to read our summary of mobile ransomware and some easy prevention tips.
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.
Microsoft Edge has replaced Internet Explorer as the default web browser on Windows 10. Edge offers plenty of new features that optimize web searches and ensure a seamless transition from any web browser. Here is the rundown on some noteworthy features: Import favorites You can easily import the list of websites you’ve marked as favorites […]
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.
Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile policy into their business. This means an increased use of mobile devices such as smartphones and tablets in daily operations. But as the number of mobile users continues to grow, so does the number of cyber crime.
Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.
We use cookies to ensure that we give you the best experience on our website. Unless you've selected "Allow", our website will deactivate the cookies session by default.