Blog

Fileless malware: who are the targets?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]

Russian hackers target Mac OS X users

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it. According to […]

Real-world audits: disaster recovery plans

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the recent audit of a state government office gifted us plenty of […]

Attacks on WordPress websites

It’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks. Recently, some 20 attackers defaced thousands of WordPress websites. If you think 20 attackers is frightening, […]

Social media platforms that suit your SMB

The first thing that comes to mind when you think of social media is Facebook and for good reason. Not only does it boast the most users, but it also has the biggest reach and cultural impact. Since there is no one-size-fits-all social media platform, it’s imperative for small- and medium-sized businesses to examine their […]

Virtualization troubles: 3 common pitfalls

Data storage may be one of the easiest facets of virtualization to explain, but that doesn’t make it immune to problems arising from confusion. There are a few things that can cause virtualized data storage to underperform, and most of them can be easily fixed by technicians who know their stuff. Read on to find […]

Do businesses need office phones any more?

The list of benefits that accompany a VoIP migration is long and conclusively proves that internet-based telephony is better than its analog predecessor. What is slightly less decisive however, is whether the liberating mobility of VoIP requires you to set up desktop phones at all. Read on for a few tips on making the right […]

Why sign up for the Office Insider program?

Microsoft churns out new Office 365 features for users almost every month. Last year, there were several additions to Word, Excel, and PowerPoint that further enhanced user experience. This year, Microsoft will likely introduce new features that can benefit businesses. If you want to stay on top of new Microsoft features and experience these advantages […]

5 great ways to prevent cyber-attacks

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are […]

Updates on Microsoft Office for Mac

Support is defined as providing assistance, encouragement, or comfort to help someone achieve a certain goal. For Mac’s version of Microsoft Office, support comes in the form of add-ins that aim to enhance user experience. Although usability testing is currently underway, you can still read about the latest developments here: Office add-ins are applications running […]