News

June 15, 2018

5 Sections You Might Want to Include in Your Cloud Computing Policy

Having a cloud computing policy is important if your business uses cloud services. Here are five sections that you might want to include in it.
June 11, 2018

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Center shows that cybercrime victims lost more than $1 billion in 2017. Here are the top five IT-related […]
June 8, 2018

Hackers Infected a Half Million Routers with Powerful Malware

Cybercriminals infected small office and home office routers with the VPNFilter malware. Here is what you need to know about VPNFilter, including what to do if […]
June 6, 2018

Watch Out for GDPR Phishing Scams

Hackers are sending out GDPR phishing emails, trying to trick people into entering the kinds of data that the General Data Protection Regulation is designed to […]
June 4, 2018

Data on Millions of Individuals and Businesses Scraped and Left Unprotected

A data firm used web scraping to collect the data it needed to create in-depth profiles on millions of people and businesses. Discover what web scraping […]
May 31, 2018

How to Troubleshoot Google Service Outages

When a cloud service suddenly stops, people often wonder “Is the whole system down?” The G Suite Status Dashboard can answer this question when a Google […]
May 29, 2018

These Password Recommendations Might Surprise You

The US National Institute of Standards and Technology (NIST) has some surprising recommendations that might prompt you to rethink your business’s password policies. Learn why change […]
May 25, 2018

5 Ways the Windows 10 April 2018 Update Can Help You Be More Productive

Microsoft has released the first major 2018 update for Windows 10. Here are five features that can help you and your employees work more efficiently.
May 23, 2018

Fake Ad Blockers Were Downloaded by 20 Million Chrome Users

Researchers found some fake ad blockers in the Chrome Web Store that were designed to carry out hackers’ remote commands. Learn which ad blockers were bogus […]