Blog

Russian hackers target Mac OS X users

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a […]

Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

Attacks on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

Popular printer brands are prone to attacks

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed […]

How to test out Android Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a cloud version of an app without having to download it from the Google Play Store. While the technology isn’t yet available to the general public, Google is running a limited test of the technology for […]

Why sign up for the Office Insider program?

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways they do this is with the Office Insider program, a voluntary Office 365 subscription that gives participants a sneak peek into future Microsoft developments. It also provides several benefits to business owners willing to take […]

Free Windows 10 upgrade for SMB’s

Microsoft has announced that it will bring back free Windows 10 upgrades, but on one condition: Only small- and medium-sized businesses that have previously passed on the offer are eligible. So if you or someone you know has declined Microsoft’s previous proposition, here are some reasons you might want to reconsider. “They’re extending the free […]

5 great ways to prevent cyber-attacks

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

Updates on Microsoft Office for Mac

It’s official. Microsoft has just announced plans to bring support for add-ins to the Mac version of its Office Suite. This marks yet another step forward in Microsoft’s efforts to make the Mac version of the Office Suite more like its Windows counterpart. At the moment, this functionality is available for testing only by users […]

Office 365 and G Suite

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business? Cost and commitment G Suite offers two […]