2804, 2016

Different types of hackers defined

By |April 28, 2016|Categories: Security|Tags: , , , , , , , , |

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll [...]

2704, 2016

Ransomware alert for healthcare practices

By |April 27, 2016|Categories: Healthcare|Tags: , , , , , , , |

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look [...]

2104, 2016

New email security feature for Office 365

By |April 21, 2016|Categories: Office|Tags: , , , , , , , |

While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new security feature for Outlook, but only if you’re an Office [...]

3103, 2016

How to manage virtualization security risks

By |March 31, 2016|Categories: Virtualization|Tags: , , , , , , , , |

When it comes to security, topics like the cloud and networks get wide coverage on Internet blogs and forums. However, other types of technology fly completely under the radar. Virtualization just so happens to fall into this category. And just because people aren’t talking about it doesn’t mean virtualized machines [...]

1503, 2016

Monitoring employees online. Is it right?

By |March 15, 2016|Categories: Security|Tags: , , , , , , , , , |

Whether or not to monitor your employees' computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process. So, should you monitor? Here [...]

1103, 2016

How to switch securely to Office 365

By |March 11, 2016|Categories: Office|Tags: , , , , , , , , |

It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but many have yet to complete their transition and still rely at least in part on on-site [...]

803, 2016

Cloud myths debunked

By |March 8, 2016|Categories: Web & Cloud|Tags: , , , , , , , |

From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind. However, reported incidents of cloud hacks and [...]

2602, 2016

How to get the most out of Office 365

By |February 26, 2016|Categories: Office|Tags: , , , , , , , |

While many Office 365 users know the service can boost their company’s productivity, many aren’t utilizing it to its full potential. There are several key principles and tips that can make the service even more productive. So to help you get the most out of Office 365, here are some [...]

1802, 2016

Tips on Windows 10 privacy protection

By |February 18, 2016|Categories: Windows|Tags: , , , , , , , , |

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here [...]

Go to Top