Blog

Healthcare Security Breaches Skyrocket

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light […]

Try out Microsoft’s newest releases today!

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team! Microsoft […]

Chrome Cleanup tool’s enhanced features

Most web browsers have built-in security measures to protect users, but some of those aren’t enough to ward off unwanted software. To improve Chrome’s security, Google rolled out some changes in its Chrome Cleanup tool for Windows. Here’s how the enhanced tool protects you. Detect hijacked settings Many users prefer to enhance their browsing experience […]

Accessorizing your Android devices

Did you know that you can connect a mouse to your Android tablet, or even an Xbox 360 controller to play a game console-style? The truth is many Android devices support a wide range of accessories. Here’s everything you need to know. USB keyboards, mice, and gamepads Android phones and tablets don’t come with standard, […]

Don’t waste money on fleets of VMs

Thanks to virtualization software, the time it takes to bring virtual machines (VMs) online is faster than ever. You could deploy a fleet of them in minutes, but as with most technologies, there are some drawbacks. Experts say too many VMs can cause a logistical nightmare and cost your business a lot of money. The […]

VoIP vocab: Open source and Proprietary

Switching to internet-based phones gives you the chance to enjoy innovative new call features and significant cost reductions. There are a lot of options when choosing which voice over IP (VoIP) platform you use, but first you need to pick whether you’ll use an open-source or proprietary system. What are “proprietary” systems? When most companies […]

Microsoft simplifies Outlook on desktop

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes. How Outlook […]

Google releases year-long security study

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results. The results From March 2016 to March 2017, Google and UC Berkeley […]

No more passwords: Windows 10 knows your face

In another example of sci-fi technology becoming reality, Microsoft’s biometric logins can now recognize your face, fingerprint, or eyes when you attempt to access your device. It’s exciting as well as convenient and we’ve got everything you need to get started, right here. Say hello to fingerprint, iris, and facial scans Windows Hello is an […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +