Our Blog

December 3, 2020

4 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky. Here are four reasons […]
November 30, 2020

What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
November 25, 2020

Top 10 Keyboard Shortcuts for Microsoft Business Apps

Microsoft apps such as Word, Edge, and Outlook are a business mainstay. When using these apps, employees can take advantage of keyboard shortcuts to save time. […]
November 23, 2020

NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]
November 19, 2020

This Microsoft Office Feature is a Time-Saver

If you work with a lot of information, there are times when you need to copy information from one file to another. Microsoft Office is a […]
November 12, 2020

Linux Users Should Be On High Alert For Drovorub Malware Attacks

Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub […]
November 9, 2020

WordPress Sites at Risk from Critical Flaw

WordPress sites running the File Manager plugin are being hounded by hackers, thanks to a critical vulnerability found in some of the plugin versions. Find out […]
November 5, 2020

What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]
November 2, 2020

Smishing and Vishing and Whaling — Oh My

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ […]