Blog

New Office 365 cyberattack on the loose

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works. Step 1 – Invitation to collaborate email The first thing […]

4 Security risks of the BYOD strategy

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks. Here […]

How to install the newest iOS smoothly

When a new iOS update is released, you may get so amped that you immediately tap on that Download and Install button. The next thing you know, you’re saddled with new software that causes headache after headache. To avoid this fate, here are six tips to ensure that your next iOS update goes without a […]

The pitfalls of business continuity planning

Your service provider, tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Unfortunately, that kind of longevity in developing continuity plans can result in some providers overlooking or underestimating certain issues. Here are some of them. Over-optimistic testing The initial testing attempt is usually the […]

Android repurposing: 5 awesome ideas

It’s a fact of life that electronic devices don’t stay on top of the market for very long. That nice new Android tablet with all the latest apps and games will soon be replaced with a newer version, and you have the decision to upgrade or be left with a useless piece of metal and […]

Virtualization security risks & management

While virtualization security is often viewed as an afterthought, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to your business’s success. Let’s take a look at some of the security risks posed by virtualization and how you can manage them. Security risks of virtualization Complex infrastructure – Much like virtualization […]

7 ways to more retweets

It can be discouraging for any business to post a thoughtful tweet in the morning just to see that it barely has any retweets by the end of the day. To maximize your tweets’ exposure, consider these 7 ways to increase your retweets. Schedule your tweets There is absolutely no point in tweeting out any […]

Time-saving tips for Microsoft Word

Microsoft Word remains one of the most popular and user-friendly apps for business. It is compatible with both Windows and Mac and can be used to create a wide array of business documents. While millions of people use Word every day, most don’t know how to maximize its potential. And since it is constantly being […]

Spectre makes a comeback

When one cyberattack is stopped, another more powerful variant almost always takes its place. It happens all the time with ransomware, computer viruses, and Trojan horses. Recently, this has become the case with Spectre attacks, which exploit a fundamental flaw in modern computer chips. Here’s everything you need to know. Spectre 101 For those who […]

Get more life out of your iPhone battery

You’re on the go today – out of the office, out of the house, and attending a business event. Everything is going fine and dandy until you look down at your phone to see your worst nightmare come true. Your iPhone is at 25 percent battery life. Before you panic, know that the answer to […]