Blog

A vulnerability in Wi-Fi encryption has sent the entire tech industry scrambling; the so-called Krack attack affects nearly every wireless devices to some extent, leaving them subject to hijacked internet connections. In terms of scope; it doesn't get much worse-especially for the Internet of Things.

...

Microsoft is tweaking its Windows-as-a-service plans yet again. Here are the new names, dates and other information businesses need to know about Windows 10. If you currently use Office 365 it will now be called Office 365 ProPlus and it will get new feature update rollups twice a year, around March and September. Please continue to read the link below, if you have any questions please feel...

As Windows 10 reaches its second birthday, the support clock for earlier versions is ticking. Microsoft pulled the plug on Windows Vista earlier this year, and support for Office 2007 ends in a few months. So how long until Windows 7, Office 2010, and other currently supported versions reach the end of the line? Need help and advice with deciphering the options? Give us a call today.

...

Microsoft Word is the most widely used piece of software in the history of digital computing. If you have ever worked in any type of office environment chances are you have used this program, sometimes without even knowing it. People who have used Microsoft Word for years probably think there is nothing left to learn, think again!

...

Here are a few details you won't find anywhere else about what you get with the locked-down configuration of Windows 10 S. Microsoft has been very quiet with it latest operating system leaving IT professionals wondering what it has under the hood. Microsoft S is supposed to tbe the world's most secure operating system. Still confused? Give us a call and we will clear it up for you.

...

Security experts have said the Petya malware is out to irrecoverably wipe information, not hold to it to ransom. That means that the attacker cannot extract any decryption information from such a randomly generated string displayed on the victim, and as a result, the victims will not be able to decrypt any of the encrypted disks uisng the installation ID. (ZDNet)

...

For those in the northern hemisphere, summer is typically the time that many travel for vacation. A good way to kill time in airports is to connect to free Wi-Fi and catch up on last minute work or to get into the vacation spirit. But how safe are free hotspots? 

Free public Wi-Fi is incredibly convenient, but security can be an issue. Here's how to minimize the risk, whether you use a...

Police have now issued a warning over fake support scams using WannaCry to scare PC users into paying up. Don't be a victim to ransomware or to this tech support scam. We keep our clients safe. If you are not yet one of our clients, contact us for a consultation to see how vulnerable your company is. We'll give you honest feedback.

...

Generic high-level resources (video, audio and text) that you can share with your users that describe what ransomware is and how to protect yourself from it. 

...

Viruses, Trojans, worms, DDoS attacks, phishing attempts and now ransomware. Knowing what ransomware is (and isn't) will help you understand this relatively new challenge. If you need help protecting yourself from these dangers, please call us. 

...

Pages

Subscribe to Blog