Blog

Windows 10 Creators Update: new features

Creators Update contains the most significant upgrades to Microsoft’s Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited. Controlled updates If […]

Sly phishing attack catching users off guard

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice […]

Play with a live virtualized desktop today!

Every now and then, we need to reset the conversation about virtualization and review how it works in its most basic form. With so many advances, it can be hard to keep up if you’re not a regular reader. This article not only defines virtualization and its benefits, it also includes a real-world workstation for […]

Docs.com shares users’ sensitive files

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission. These include hundreds of users who might be unaware that their private files can […]

SMBs and social media policy reviews

Does your business have a social media policy? If so, when was the last time you updated it? If you’re taking too long to answer these questions, that isn’t a good sign. Because you should be conducting regular reviews, at least annually. You’d enjoy innumerable benefits, and deter your employees from obsessing over Snapchat filters […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +