Office 365 gets new security tools

Security is, by far, the biggest issue concerning most businesses today. Although safeguards like firewalls and antivirus software are necessary,…

Watch out for this Microsoft Word bug

Feature updates can come and go, but when Microsoft releases a security update, you need to install it as soon…

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last…

Chrome and Safari: hackers’ newest tools

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking…

New cyber-threats in 2017 to watch out for

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made…

New features keep Office 365 users safe

The new features recently unveiled by Office 365 promise to bring business owners to a more secure and knowledgeable position…

What’s the best way to verify user identity?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for…

Social engineering and personal security

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit,…

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those…

Are your VMware machines up to date?

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT…