Our Blog

December 7, 2020

Software Vulnerabilities: Loved by Cybercriminals, Dreaded by Companies

Software vulnerabilities are common despite being are to find. Find out why hackers love discovering new ones and how companies can deal with the aftermath of […]
December 3, 2020

4 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky. Here are four reasons […]
November 30, 2020

What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
November 25, 2020

Top 10 Keyboard Shortcuts for Microsoft Business Apps

Microsoft apps such as Word, Edge, and Outlook are a business mainstay. When using these apps, employees can take advantage of keyboard shortcuts to save time. […]
November 23, 2020

NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]
November 19, 2020

This Microsoft Office Feature is a Time-Saver

If you work with a lot of information, there are times when you need to copy information from one file to another. Microsoft Office is a […]
November 12, 2020

Linux Users Should Be On High Alert For Drovorub Malware Attacks

Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub […]
November 9, 2020

WordPress Sites at Risk from Critical Flaw

WordPress sites running the File Manager plugin are being hounded by hackers, thanks to a critical vulnerability found in some of the plugin versions. Find out […]
November 5, 2020

What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]