PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users. Here’s how to stay

By |2019-11-13T15:37:50+00:00August 27th, 2018|Office|

PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users. Here’s how to stay

By |2019-11-13T15:38:06+00:00August 27th, 2018|Office|

Controlling security risks of virtualization

Virtualization security often ends up on the back burner, and you probably didn’t even realize how important it is. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and ways to control them. Security risks of

By |2019-11-13T15:41:55+00:00August 14th, 2018|Virtualization|

How to prepare for a VoIP transition

Businesses everywhere are embracing Voice over Internet Protocol (VoIP) technology to communicate more effectively with colleagues, clients, and suppliers. Transitioning from traditional phone lines to a VoIP solution smoothly requires preparation and forethought. Here are the key components to making the shift. Network stability Implementing a VoIP phone system presents unique challenges, such as maintaining

By |2019-11-13T15:42:01+00:00August 10th, 2018|VoIP|

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more. Spectre 101 For those who don’t know, Spectre is a vulnerability in

By |2019-11-13T15:42:14+00:00August 7th, 2018|Security|

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more. Spectre 101 For those who don’t know, Spectre is a vulnerability in

By |2019-11-13T15:42:24+00:00August 7th, 2018|Security|

Best practices for switching to Office 365

More and more small and medium-sized businesses are making the switch from on-premises systems to cloud-hosted Office 365. If you’re one of them, you need to ensure a smooth and secure transition. Here’s what you need to do. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and personal data

By |2019-11-13T15:44:15+00:00July 25th, 2018|Office|

IT security policies your company needs

Businesses rarely address cybersecurity in their company policies. With cybercrimes becoming more prevalent, it's important you inform staff about the threats they could be exposed to. Make sure your business and employees are safe with these security policies. Internet In today’s business world, employees spend a lot of time on the internet. To ensure they’re

By |2019-11-13T15:44:21+00:00July 23rd, 2018|Security|

4 misconceptions about the Cloud

Cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few things some businesses owners misunderstand about the cloud. #1. Cloud infrastructures are unsecure Information security is a necessity for

By |2019-11-13T15:44:41+00:00July 18th, 2018|Web & Cloud|

Quick review: why you need virtualization

With virtualization, you can make software see several distinct computers even if there is only one, or make several computers register as one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few. More technology uptime Virtualization vendors use fancy names for

By |2019-11-13T15:44:55+00:00July 12th, 2018|Virtualization|