Our Blog

June 27, 2019

Save Time by Setting Up Rules in Outlook and Gmail

Slogging through numerous emails every day takes time. Declutter your Inbox by taking advantage of Microsoft Outlook’s and Google Gmail’s filtering functionality. If you are like […]
June 24, 2019

Is Your SaaS Data at Risk?

Companies that assume their SaaS provider will restore application data they accidentally lose are risking permanently losing that data. Learn why SaaS providers are not required […]
June 20, 2019

7 Ways Businesses Can Use Office 365 More Securely

Microsoft Office 365 has become a popular target for hackers. Here are seven measures your company can take to keep them at bay if you are […]
June 17, 2019

Running WhatsApp on Your Smartphone? Make Sure It Has the Latest Update

  A dangerous security vulnerability has been found and exploited in WhatsApp. Here is what you need to know. A security hole in the WhatsApp messaging […]
June 13, 2019

Nearly 1 Million Windows Computers Have Serious Vulnerability

If any of your business’s computers are running older versions of Windows, you need to make sure they receive a patch that fixes a vulnerability known […]
June 6, 2019

Software Supply Chain Attacks Are on the Rise

Software supply chain attacks are becoming more widespread. Learn what they are and how they occur so you can develop a strategy to help manage the […]
June 3, 2019

Watch Out for This Direct Deposit Scam

Cybercriminals are trying to scam businesses into depositing employee paychecks into their bank accounts. Learn about the variations of the scam and what you can do […]
May 30, 2019

Why You Need Both a Disaster Recovery Plan and a Business Continuity Plan

It’s not uncommon for companies to think that disaster recovery and business continuity plans are one and the same. Learn why both plans are needed. Tornados, […]
May 28, 2019

All It Took Was 52 Seconds for Hackers to Attack a Poorly Secured Server

Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect […]