Why your business should record calls

Posted on Monday June 22, 2020

Voice over Internet Protocol (VoIP) provides small- and medium-sized businesses (SMBs) with the convenience of making and receiving calls from anywhere with an active internet connection. VoIP enables your staff to meet the demands of your clients, which boosts customer satisfaction. VoIP also has another feature that can take your customer service to the next level: call recording.

 

Crooks Abuse Google Analytics To Conceal Theft of Payment Card Data

Posted on Monday June 22, 2020

An anonymous reader quotes a report from Ars Technica: Hackers are abusing Google Analytics so that they can more covertly siphon stolen credit card data out of infected ecommerce sites, researchers reported on Monday. Payment card skimming used to refer solely to the practice of infecting point-of-sale machines in brick-and-mortar stores. The malware would extract credit card numbers and other data. Attackers would then use or sell the stolen information so it could be used in payment card fraud. One challenge in pulling off the hack is bypassing website security policies or concealing the exfiltration of massive amounts of sensitive data from endpoint security applications installed on the infected network. Researchers from Kaspersky Lab on Monday said that they have recently observed about two dozen infected sites that found a novel way to achieve this. Instead of sending it to attacker-controlled servers, the attackers send it to Google Analytics accounts they control. Since the Google service is so widely used, ecommerce site security policies generally fully trust it to receive data. "Google Analytics is an extremely popular service (used on more than 29 million sites, according to BuiltWith) and is blindly trusted by users," Kaspersky Lab researcher Victoria Vlasova wrote here. "Administrators write *.google-analytics.com into the Content-Security-Policy header (used for listing resources from which third-party code can be downloaded), allowing the service to collect data. What's more, the attack can be implemented without downloading code from external sources." The researcher added: "To harvest data about visitors using Google Analytics, the site owner must configure the tracking parameters in their account on analytics.google.com, get the tracking ID (trackingId, a string like this: UA-XXXX-Y), and insert it into the web pages together with the tracking code (a special snippet of code). Several tracking codes can rub shoulders on one site, sending data about visitors to different Analytics accounts." The "UA-XXXX-Y" refers to the tracking ID that Google Analytics uses to tell one account from another. As demonstrated in the following screenshot, showing malicious code on an infected site, the IDs (underlined) can easily blend in with legitimate code.

 

Microsoft 365 signals a new era of productivity for SMBs

Posted on Friday June 19, 2020

In April 2020, Microsoft launched Microsoft 365, the successor to its popular Office 365. But it's not a mere name change. The tech giant is also introducing improvements to its productivity software that will enhance how your business deals with cyberthreats every day.

 

Why does HTTPS matter?

Posted on Wednesday June 17, 2020

Almost everyone in the world browses the internet every day. People look up information, shop, chat with friends, or just pass the time by surfing the web. Internet browsing has become second nature to us that we often forget one thing: checking our address bar for an 'S' after the 'HTTP' prefix.

 

How MSPs are supporting clients during the COVID-19 pandemic

Posted on Monday June 15, 2020

The COVID-19 pandemic and the sweeping shutdowns to contain the spread of the virus brought about significant impacts on businesses. Many small companies realized they lacked the resources to rapidly adopt a remote work setup and tapped their IT partners to help address their technology demands. Here's how managed IT services providers (MSPs) are rising to the challenge.

 

Why the latest Windows 10 update is blocked on some PCs

Posted on Friday June 12, 2020

Last week, Microsoft unveiled the May 2020 Update, which is the latest version of Windows 10. While some users are able to update their systems, some PCs are prevented from installing it. Here's what's causing the update block, and how you can bypass it.

 

Page:   1...126127128129130131132133134...350

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016