What is virtual “sandboxing”?

Posted on Friday April 28, 2017

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it's worth learning about.

 

Five tips to prevent VoIP eavesdropping

Posted on Thursday April 27, 2017

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it's not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever since it was introduced to the market. Here are five tips to combat VoIP eavesdropping:

 

Microsoft Word bug: What you need to know

Posted on Wednesday April 26, 2017

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.

 

Best new features in Windows 10

Posted on Tuesday April 25, 2017

Creators Update contains the most significant upgrades to Microsoft's Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited.

 

The phishing craze that’s blindsiding users

Posted on Monday April 24, 2017

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice for how to avoid the newest trend in phishing.

 

Mac Pro gets revamped

Posted on Friday April 21, 2017

Mac Pro users have long awaited the release date of the new workstation, and who could blame them when the current model has been available since 2013. Thankfully, Apple just confirmed that the revamped Mac Pro is on its way. From specs, features, and design changes, here's the latest information we have about Apple's high-end desktop.

 

Page:   1...279280281282283284285286287...353

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016