Blog

Office 365 threat comes with new techniques

If you’re using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users’ credentials and attack organizations internally. Get yourself informed and read on. What makes it different from other scams? The new threat comes in the form of spear phishing, […]

DR tips for floods and hurricanes

The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive. […]

Improvements on the new Outlook webmail

Organizing email is an important but time-consuming task. An email system that lets employees spend less time sorting messages and adjusting settings and more time working is an easy way to improve your business. If your company uses Outlook.com, here are some new features that help. Easy elimination of unwanted emails Employees spend an excessive […]

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide. What is it? Little is known about the adware itself or those behind it, but […]

Reduce your printing costs with these 5 tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget. Start by following these five tips. Replace outdated printers Outdated and cheap printers may be functional, but they are […]

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims’ data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims. Let’s discuss how it works and what you can do to prevent […]

Why are businesses using VoIP?

VoIP phone systems have come a long way from the early days of glitchy calls and limited features. Today, they’re an integral part of small- to medium-sized businesses’ telecommunications strategies. But what exactly are they and what benefits can they bring your business? What is VoIP? VoIP, or Voice over Internet Protocol, is a technology […]