Blog: Resources & Tips

CCleaner: A Tale of Two Attacks

CCleaner has been the target of hackers twice in the last three years. Here are several lessons that you can learn from these attacks. CCleaner — a popular app designed to clean up unused data, unnecessary settings, and other leftovers that can make computers run slower — was the target of hackers once again. In 2017, […]

Read More

New Firefox Version: Another Look

Mozilla has released version 70 of its Firefox web browser. Find out the main changes the company made to better protect your privacy. Mozilla released version 70 of its Firefox web browser in October 2019. Its push this year has been building privacy-centric features that are enabled by default in its products, according to company officials. […]

Read More

5 Things You Should Know about Phishing

The more you know about phishing, the better you will be able to spot phishing attacks. Here are five phishing fundamentals that can help you avoid becoming the next victim. Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing […]

Read More

Using Strong Passwords Is Not Always Enough to Prevent Cyberattacks

Using unique, strong passwords is not always enough to prevent hackers from attacking your company. Learn about a better way to protect your online accounts and ultimately your business. Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain […]

Read More

How Using E-Signatures Can Help Your Business

Electronic signatures are as legally binding as handwritten signatures. Find out how they can improve productivity and cut down on paperwork. Governments around the world recognize electronic signatures (e-signatures) as a legal way to sign a document. For example, e-signatures have the same legal standing as physical signatures in the United States, thanks to the […]

Read More

New Android Ransomware Spreads Through Forum Posts and Customized Texts

Cyber extortionists have created new ransomware that encrypts files on Google Android devices. Find out how this ransomware infiltrates devices so you can avoid becoming a victim. A new family of ransomware known as Android/Filecoder.C has been discovered. The initial infection occurs when Google Android device users download a malicious app by means of a […]

Read More

Mac OS Tips for Windows Users

If you are a Windows user and need to make the switch to MacOS, it can seem difficult at first to navigate with the slight differences between the two operating systems. Here is a quick list of shortcuts and explanations for the MacOS system to make the transition easier. The Dock Like the Windows Taskbar […]

Read More

Equifax to Pay up to $425 Million to People Affected. Are you Included?

In 2017 Equifax publicly announced that a data breach occurred and exposed personal information of 147 million people. Find out if you’re eligible to claim benefits. The Federal Trade Commission posted information about the settlement late July on its website and encourages claims to be filed immediately. The credit-check company, Equifax, has reached an agreement […]

Read More

5 Ways to Protect Your NAS Device from Ransomware

Network-attached storage (NAS) devices are common targets of ransomware attacks. Find out why NAS devices are often attacked and what you can do to protect your storage device and the data in it. Small and midsized businesses often use network-attached storage (NAS) devices for file sharing, storage, and backups. Because these devices are used to […]

Read More

5 Common Misconceptions about Hybrid Clouds

The concept of a hybrid cloud is still hazy in many people’s minds. Here are five common misconceptions about hybrid clouds set straight. Despite being introduced back in 2011, the concept of a hybrid cloud is still hazy in many people’s minds. This is understandable given that there are many misconceptions about what hybrid clouds are and how […]

Read More

5 Ways You Can Better Protect Your Windows 10 Computer Thanks to the May 2019 Update

More than a billion adults have been the victims of cybercrime. Here are five security-related improvements rolled out through the Windows 10 May 2019 Update that can help you avoid becoming the next victim. People fear cyberattacks more than physical attacks or robbery — and for good reason. More than 1 billion adults have been the victims of cybercrime, […]

Read More

Save Time by Setting Up Rules in Outlook and Gmail

Slogging through numerous emails every day takes time. Declutter your Inbox by taking advantage of Microsoft Outlook’s and Google Gmail’s filtering functionality. If you are like most people, you receive numerous emails at work. Employees receive an average of 126 emails per day, according to one study. Having to slog through that many emails takes time […]

Read More

Is Your SaaS Data at Risk?

Companies that assume their SaaS provider will restore application data they accidentally lose are risking permanently losing that data. Learn why SaaS providers are not required to restore this data and what you can do to avoid permanent data loss. Software as a Service (SaaS) is the largest segment of the cloud computing market, with […]

Read More

SaaS, IaaS, and PaaS: What’s the Difference?

You have probably seen the acronyms SaaS, IaaS, and PaaS before, but do you know what they mean? Discover what these acronyms represent and, more important, the differences between them. The IT industry is embracing the shift from ownership-based business models to service-based ones. Vendors are increasingly offering their hardware, software, and other IT products […]

Read More

Watch Out for This Direct Deposit Scam

Cybercriminals are trying to scam businesses into depositing employee paychecks into their bank accounts. Learn about the variations of the scam and what you can do so that your business does not become the next victim. Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have […]

Read More

Don’t Let Your Phone Stalk You

Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone. The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones. […]

Read More

All It Took Was 52 Seconds for Hackers to Attack a Poorly Secured Server

Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect your devices. Companies often enable Secure Shell (SSH) in servers, network attached storage (NAS), and other devices so that users can remotely access them. Security experts highly recommend using […]

Read More

Software Supply Chain Attacks Are on the Rise

Software supply chain attacks are becoming more widespread. Learn what they are and how they occur so you can develop a strategy to help manage the risks. The statistic is alarming. Software supply chain attacks increased by 78% in 2018, according to Symantec’s “2019 Internet Security Threat Report“. And security experts expect the number of […]

Read More

Debunking 4 Common Myths about Complying with Data Privacy Regulations

The General Data Protection Regulation (GDPR) protects the data privacy rights of European Union citizens, while the California Consumer Privacy Act (CCPA) gives California residents more control over their personal data. Similarly, the Health Insurance Portability and Accountability Act (HIPAA) safeguards the medical information of US citizens. Regulations that protect people’s privacy and data rights […]

Read More

What You Need to Know about Foldable Phones

Foldable phones have been stealing the tech spotlight recently, but are they really all they’re cracked up to be? Here is what you need to know to make up your own mind. Thanks to new offerings from Samsung and Huawei, foldable phones have been making a comeback. These mobile devices are smartphone-tablet hybrids. Vendors are […]

Read More

Are Your Employees Inadvertently Exposing Your Company’s Sensitive Data?

The ease in which employees can now share information coupled with current cultural trends is causing accidental data leaks in many businesses. Learn how to prevent employees from accidentally exposing your organization’s sensitive data. The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of […]

Read More

Malvertising Is Likely Coming to a Browser Near You

Cybercriminals are increasingly posting malicious ads on legitimate websites to obtain data and spread malware. Discover how malvertising works and what you can do to protect your business from it. Cybercriminals do not take holidays off — in fact, they often use them to their advantage. That’s how a group of hackers celebrated President’s Day […]

Read More

6 Ways to Make Your Passwords Easy to Crack

Passwords are an important line of defense against cyberattacks, yet many people make it easy for hackers to crack them. Here are six mistakes that people often make when creating passwords. Serious consequences can result from cracked passwords. Cybercriminals might use them to steal money or data from the compromised accounts. Or they might change […]

Read More

7 Ways to Spend Less Time Dealing with Emails

Business professionals often spend a lot of time reading and responding to emails every day. If you are one of them, here are seven ways you can reduce the amount of time you spend dealing with emails. In many businesses, employees use emails to communicate with each other, customers, suppliers, and other business associates. And […]

Read More

What Is Digital Transformation and Why Are Companies Pursuing It?

Digital transformation is a popular topic of discussion in boardrooms. Learn what digital transformation is all about and why companies are interested in digitally transforming themselves. IDC predicts that at least 55% of organizations will be digitally transforming themselves by 2020. But what exactly is digital transformation? More important, why are companies pursuing it? What “Digital […]

Read More

Don’t Let Your IT Policies and Procedures Fall by the Wayside

IT policies and procedures are not “set and forget” documents. Discover why they need to be reviewed regularly and learn some tips on how to do so. Businesses sometimes create IT policies and procedures and then forget about them. Reviewing IT policies and procedures is important for several reasons, including: Keeping IT systems running optimally. Companies create […]

Read More

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses. Cyber criminals have another trick up their sleeves. Besides using phishing emails to steal money and data from businesses, some hackers are now employing an additional technique known as reputation-jacking — using popular, legitimate cloud […]

Read More

7 Reasons Why IT Projects Fail

Projects frequently fail in businesses. Here are seven common reasons why IT projects fail and how you can avoid these pitfalls. Having projects that fail is common in businesses. In one 2018 study, the Project Management Institute surveyed more than 5,500 companies and found that 15% of the projects they started failed. And these failures were […]

Read More

4 Misconceptions about Tech Support Scams

Despite being common, there are many misconceptions about tech support scams. Not knowing the truth can result in falling victim to this type of fraud. Here are four misconceptions set straight. Tech support scams are common and costly. In 2017 alone, around 11,000 victims filed complaints with the Internet Crime Complaint Center (IC3). They reported losing […]

Read More

Small and Midsized Businesses Continue to Be Common Targets in Ransomware Attacks

Ransomware continues to pose a significant threat to small and midsized businesses, according to a Datto survey of 2,400 managed service providers (MSPs). More than half of the MSPs reported that a least one of their clients experienced a ransomware attack in the first half of 2018. Although the average ransom was only $4,300, the attacks cost […]

Read More

Why Cryptojacking Is More Dangerous Than Many Businesses Realize

  Cryptojacking might not seem as dangerous as ransomware or data breaches since cybercriminals are stealing a computer’s processing power rather than money or data. However, companies that dismiss this threat might be putting their businesses at risk. Cryptojacking malware is becoming increasingly sophisticated, which could spell trouble for companies unprepared for it. The Changing […]

Read More